x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xffffffffffffffe0, 0x2) fsetxattr$smack_xattr_label(r0, &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)={'/dev+loop#\x00'}, 0xc, 0x3) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000240)=0xc8) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000200)=0x98, 0x8) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) 10:18:20 executing program 1: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) 10:18:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:21 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0x9, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r3 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x2, 0x80000) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000140)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0x337412b5, 0x7fff, 0x3, 0x3, 0x1b, 0x0, 0x37, 0xe9, 0x7, 0x8, 0x9, 0x58e0000}) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:21 executing program 1: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) 10:18:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/133, 0x85}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xe126, 0x0, 0x0, 0x800e00529) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0x10000}, 0x10) setitimer(0x0, &(0x7f0000000080), 0x0) recvfrom$inet(r1, 0x0, 0xfffffe44, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) 10:18:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:21 executing program 1: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) 10:18:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000280), 0xf8) 10:18:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:21 executing program 1: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) 10:18:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:21 executing program 2: ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 10:18:21 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) writev(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x422000a7b, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) getpid() sched_setattr(0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') getpid() r4 = socket(0x0, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, 0x0) sendmsg$key(r4, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='\xb5\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 625.628687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 10:18:22 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000500)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0xb0, r3, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000280)={r5, 0x46, 0xf0}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha256-avx\x00'}}, &(0x7f0000000340)="8c268c0f9787e1a65709476376fca74106362345e462c650d0b25eb3af2de80eeb71ee63701e1a6b0f900ef32b16bff09958d6e9aaec9345c2182790342b98e3519b6ee884fb", &(0x7f00000003c0)=""/240) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x7fff, 0x4, &(0x7f00000000c0)=[0x1f, 0x310, 0x200, 0x54], &(0x7f0000000140)=[0x0, 0x5, 0x0, 0x8e, 0x400], &(0x7f0000000180)=[0x3], &(0x7f0000000200)=[0x2, 0x0]}) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) 10:18:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/133, 0x85}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xe126, 0x0, 0x0, 0x800e00529) shutdown(r0, 0x0) setitimer(0x0, &(0x7f0000000080), 0x0) recvfrom$inet(r1, 0x0, 0xfffffe44, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) 10:18:22 executing program 1: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 625.688823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 [ 625.756250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 [ 625.786660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 10:18:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:22 executing program 1: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 625.892177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 [ 625.945856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 [ 625.958991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 [ 625.972227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 10:18:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:22 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4800000000000000, 0x3) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000140)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x600100, 0x0) bind$rds(r3, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000240)={0x0, 0xcd, "2420c90b55f5658227f29e31cc0da8aba5dffdc0848e1a4bebcfe65478d3d4f96f0f80b52286fa4a349d3330c2e94d2a1fb610b9a521d129a6ad7d9fe99e6b543b3b7b6cc18bf2e93769f5f56399ac4e6e934417a31cd9f59ae4a1f1b5d45d66df2a17a8cc1c8530a5dd8cfd5de187f1d0cc500a072992092f3a01820317bbd68003f2a9aeb55b4676809b3338c7df0592a3ec6863f2601bccb0751b0f58afeed29ddaf341a4f2fbd11cc8be76539602ad99b30c69c790bc30d69c8ceaf05ba67aed0e29a0661a3e4c1c7a10e0"}) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) [ 625.985431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 10:18:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 626.019669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29549 comm=syz-executor.0 10:18:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x6, 0x1f) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x35b442, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000040)=0x4) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000000c0)={r6, 0x485}, &(0x7f0000000100)=0x8) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x51e}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x8a, 0x5}) close(r0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x6d8) 10:18:22 executing program 2: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:22 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x7fffffff, @mcast2, 0x5}}}, 0x84) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) getuid() ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000003e00)=[{&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000025c0)=[{&(0x7f00000004c0)="f5", 0x1}], 0x1, &(0x7f0000002700)=[@sndinfo={0x20}, @init={0x18, 0x84, 0x5}], 0x38}], 0x1, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:22 executing program 1: eventfd(0x5) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 626.348973] kauditd_printk_skb: 13 callbacks suppressed [ 626.348988] audit: type=1800 audit(1576318702.625:377): pid=29604 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17003 res=0 10:18:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 626.454103] audit: type=1804 audit(1576318702.695:378): pid=29613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/860/file0" dev="sda1" ino=17003 res=1 10:18:22 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000009b2b128ff52da24a44faff66818e01df39ff90e4b5c2f852ab5cb69fa096d881b763e5ec67fc06733ed386", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1, r3}, 0x20) r4 = socket$inet6(0xa, 0x3, 0xff) close(r4) 10:18:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) [ 626.600076] audit: type=1800 audit(1576318702.695:379): pid=29613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17003 res=0 10:18:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 626.735731] audit: type=1800 audit(1576318702.725:380): pid=29615 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17265 res=0 [ 626.871230] audit: type=1804 audit(1576318702.805:381): pid=29603 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir106848705/syzkaller.ATb4x3/843/file0/file0" dev="sda1" ino=17265 res=1 10:18:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 626.928946] audit: type=1800 audit(1576318702.805:382): pid=29603 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17265 res=0 10:18:23 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000180)) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) write$P9_RLOPEN(r2, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0xb56813dd7ea5c50d, 0x1, 0x7}, 0x8}}, 0x18) 10:18:23 executing program 0: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x4, 0x0, "a9ebb32795774683847c80870ad647a6ddaf62c5c469814102f4c41c6337e0837d68a59f30a0f3748a22135e9971099d8c1704eee57b14517115bba449cc89f639f934202a6dba826e152b840f5b4a1e"}, 0xd8) sendto$inet(r3, 0x0, 0x1d0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmmsg(r3, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/82, 0x52}], 0x1}}], 0x1, 0x1, 0x0) fsync(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:23 executing program 1: eventfd(0x5) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 627.209570] audit: type=1800 audit(1576318703.485:383): pid=29645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16997 res=0 10:18:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 627.295573] audit: type=1804 audit(1576318703.535:384): pid=29645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir056620947/syzkaller.DBfwgA/724/file0" dev="sda1" ino=16997 res=1 10:18:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 627.423681] audit: type=1800 audit(1576318703.535:385): pid=29645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16997 res=0 [ 627.546538] audit: type=1800 audit(1576318703.605:386): pid=29649 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16963 res=0 10:18:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000009b2b128ff52da24a44faff66818e01df39ff90e4b5c2f852ab5cb69fa096d881b763e5ec67fc06733ed386", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1, r3}, 0x20) r4 = socket$inet6(0xa, 0x3, 0xff) close(r4) 10:18:23 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x4000, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x14000, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x113) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01e79d62b5b9", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000200)={r6, 0xe1, "b157acc1d46afd56d2b8e51282933d9015bef7bf6a509b486a869b30416ace33ef10d20c3abe7d1a34ad16907bd7edba20676981941324230f2001a90a5248e79b37adb77bb33736806d22555b70d0f9fc70eecc2a916fd69a989146efadd49535f28cdd4b060208a55226e2e600a39b2304496ca500f45950ca4cbfeee55545c633c12e67df41ceb7078b2c3d867a4d0432ed8e6ab6928d57eb84afd788341d0dbd0d332b46a20191d8702d7ce9c6a421e76cf464342765185ec3286f266aa7eb05850e0ced60d0740b8d1760621c3c62635156dca8216c44a221c51bb16e1450"}, &(0x7f0000000140)=0xe9) r7 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r7, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r8) r9 = add_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r8) keyctl$invalidate(0x15, r9) getdents64(r7, &(0x7f0000002880)=""/4092, 0xffc) 10:18:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:24 executing program 1: eventfd(0x5) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:24 executing program 0: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x4, 0x0, "a9ebb32795774683847c80870ad647a6ddaf62c5c469814102f4c41c6337e0837d68a59f30a0f3748a22135e9971099d8c1704eee57b14517115bba449cc89f639f934202a6dba826e152b840f5b4a1e"}, 0xd8) sendto$inet(r3, 0x0, 0x1d0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmmsg(r3, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/82, 0x52}], 0x1}}], 0x1, 0x1, 0x0) fsync(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000009b2b128ff52da24a44faff66818e01df39ff90e4b5c2f852ab5cb69fa096d881b763e5ec67fc06733ed386", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1, r3}, 0x20) r4 = socket$inet6(0xa, 0x3, 0xff) close(r4) 10:18:25 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x9, 0x3, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0xe9795df5c36f59ab, 0x0) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000140)={0x401, 0x5, 0xfffe}) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) 10:18:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:25 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) r2 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f00000000c0)={{0x7, 0x2, 0x7f, 0xff, 0x6, 0x9}, 0x40}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 629.328036] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) 10:18:25 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9f07, 0x80) ioctl$TCFLSH(r4, 0x540b, 0x0) close(r3) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r3, r5, 0x0, 0x80001d00c0d0) ioctl$NBD_CLEAR_SOCK(r5, 0xab04) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) r8 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000140)={r10, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e21, 0x2, @loopback, 0x400}}, 0x1, 0x1, 0x80000001, 0x8, 0x2ef}, &(0x7f0000000180)=0x98) 10:18:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:25 executing program 0: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x4, 0x0, "a9ebb32795774683847c80870ad647a6ddaf62c5c469814102f4c41c6337e0837d68a59f30a0f3748a22135e9971099d8c1704eee57b14517115bba449cc89f639f934202a6dba826e152b840f5b4a1e"}, 0xd8) sendto$inet(r3, 0x0, 0x1d0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmmsg(r3, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/82, 0x52}], 0x1}}], 0x1, 0x1, 0x0) fsync(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 629.368630] FAT-fs (loop1): Filesystem has been set read-only [ 629.401339] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 10:18:25 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000009b2b128ff52da24a44faff66818e01df39ff90e4b5c2f852ab5cb69fa096d881b763e5ec67fc06733ed386", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1, r3}, 0x20) socket$inet6(0xa, 0x3, 0xff) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000140)="0dcd8c891bb7fb8a66084fd5d0294a87e47b3c848750542447cf99e1898d280e730b5f63925b8e2be0b56b211a67fb017c0c285a3b2275ee6bdf90649e4af8e4022bcfda9ab7c31455cec67082c89d74a1ab3ca61bae9f56476b415f7564011bd8485651386459b969326ae649300a52c29e9fa67b5ffb6d0e919f0b1c", 0x7d) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:26 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000009b2b128ff52da24a44faff66818e01df39ff90e4b5c2f852ab5cb69fa096d881b763e5ec67fc06733ed386", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1, r3}, 0x20) 10:18:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:27 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{}]}) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x5}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000340)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) 10:18:27 executing program 0: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x4, 0x0, "a9ebb32795774683847c80870ad647a6ddaf62c5c469814102f4c41c6337e0837d68a59f30a0f3748a22135e9971099d8c1704eee57b14517115bba449cc89f639f934202a6dba826e152b840f5b4a1e"}, 0xd8) sendto$inet(r3, 0x0, 0x1d0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmmsg(r3, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/82, 0x52}], 0x1}}], 0x1, 0x1, 0x0) fsync(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:27 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:27 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r0, &(0x7f0000000100)=0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x9) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)='\x00') r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) 10:18:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000009b2b128ff52da24a44faff66818e01df39ff90e4b5c2f852ab5cb69fa096d881b763e5ec67fc06733ed386", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1, r3}, 0x20) 10:18:27 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) r2 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r2, &(0x7f0000000100)=0x0, &(0x7f0000000180)) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x9, 0x200, 0x8000000000000, 0x9, r2}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) r4 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000200)) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r6 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000340)="df1dcf8d7b51468e317e27f42f307207f86cad04dc5f9b80252669d4ba85fcea3275e7fd56bb4f7e4ef92bd89ad0616865ca3e596e51bd9250e3856dc17d99ca9b994a29ed0841722ecf71aa3dbbd59a1af76de99d4db2bce11d5c05a2f4757617033aac55dbf25b50a144f2fd7e5b9bf59665dcc488a5e1a5f229ec123d649961564f", 0x83, 0xfffffffffffffffa) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', '/dev+loop#\x00'}, 0x23, r6) connect$packet(r5, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r5, &(0x7f0000001880)=""/4096, 0x1000) 10:18:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 631.729029] kauditd_printk_skb: 23 callbacks suppressed [ 631.729042] audit: type=1800 audit(1576318708.005:410): pid=29822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17345 res=0 10:18:28 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="0200000000fa62f8b3350cb7000000950b000044f90003cfff00000300000000000000e90200000000000001000100"]) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) [ 631.937577] audit: type=1804 audit(1576318708.005:411): pid=29822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/866/file0/file0" dev="sda1" ino=17345 res=1 10:18:28 executing program 0: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x4, 0x0, "a9ebb32795774683847c80870ad647a6ddaf62c5c469814102f4c41c6337e0837d68a59f30a0f3748a22135e9971099d8c1704eee57b14517115bba449cc89f639f934202a6dba826e152b840f5b4a1e"}, 0xd8) sendto$inet(r3, 0x0, 0x1d0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmmsg(r3, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/82, 0x52}], 0x1}}], 0x1, 0x1, 0x0) fsync(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 632.068997] audit: type=1800 audit(1576318708.005:412): pid=29822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17345 res=0 10:18:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 632.171722] audit: type=1800 audit(1576318708.445:413): pid=29844 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17016 res=0 10:18:28 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x5000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) [ 632.233403] audit: type=1804 audit(1576318708.485:414): pid=29844 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir056620947/syzkaller.DBfwgA/729/file0" dev="sda1" ino=17016 res=1 [ 632.369885] audit: type=1800 audit(1576318708.485:415): pid=29844 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17016 res=0 10:18:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:28 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0xa, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 10:18:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 632.764381] audit: type=1800 audit(1576318709.045:416): pid=29864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17361 res=0 10:18:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 632.914174] audit: type=1804 audit(1576318709.045:417): pid=29864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/867/file0" dev="sda1" ino=17361 res=1 10:18:29 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0xc, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) [ 633.020482] audit: type=1800 audit(1576318709.045:418): pid=29864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17361 res=0 10:18:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:29 executing program 0: eventfd(0x5) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x4, 0x0, "a9ebb32795774683847c80870ad647a6ddaf62c5c469814102f4c41c6337e0837d68a59f30a0f3748a22135e9971099d8c1704eee57b14517115bba449cc89f639f934202a6dba826e152b840f5b4a1e"}, 0xd8) sendto$inet(r3, 0x0, 0x1d0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmmsg(r3, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/82, 0x52}], 0x1}}], 0x1, 0x1, 0x0) fsync(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:29 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000140)={@broadcast, @multicast2, @multicast1}, 0xc) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x9, 0x5, 0x1f}) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 633.490472] audit: type=1800 audit(1576318709.765:419): pid=29892 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16963 res=0 10:18:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:30 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xfffffffffffffe34) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r11, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000000140)={r12, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x8}, 0xfffffffffffffedb) ftruncate(r9, 0x200004) r13 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x20100, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendfile(r13, r14, 0x0, 0x80001d00c0cc) r15 = accept4$packet(r9, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14, 0x800) connect$packet(r15, &(0x7f0000000100)={0x11, 0xf6, r7, 0x1, 0x2, 0x6, @broadcast}, 0x14) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$instantiate(0xc, r3, &(0x7f0000000000)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'selinuxcgroup$!ppp0:security', 0x20, 0x7}, 0x47, r4) close(r0) 10:18:31 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xffffff9c}}, &(0x7f0000e6bffc)='GPL\xfb', 0x6, 0xffffffffffffff90, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x78) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:31 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)={0x2d, r4, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x3, 0x0, {0x14, 0x17}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r4, 0x813, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x200008c0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f00000000c0), 0xffffffffffffff8d) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r6 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r6, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r6, &(0x7f0000001880)=""/4096, 0x1000) 10:18:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:31 executing program 0: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xff, 0x28000) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='\xf9\xff\xff\xff\x02\x00', 0xc901, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0xcbe80c2a3770daac, 0x0) close(r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) fchown(r2, r3, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000cc0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001300)={{{@in6=@empty, @in=@multicast2}}, {{@in6=@remote}}}, &(0x7f0000000d40)=0xffffffffffffff10) sendmsg$nl_route(r4, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008040}, 0xcd101f302e21c6f0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/procurrent\x00', 0x2, 0x0) socket(0x40000000015, 0x5, 0x0) r6 = syz_open_dev$mouse(0x0, 0x1ffc0000000, 0x301600) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) syz_mount_image$nfs4(&(0x7f0000000200)='nfs4\x00', &(0x7f0000000240)='./bus\x00', 0x10002, 0xa, &(0x7f0000000b00)=[{&(0x7f0000000440)="170e58f5009757b4c3f8f3bb0d4ef6cfddaffc78be67d2dc10ebe9aecc43deea6241103ad2664554ac5c1364e295692fccccd765cbb5d03a66539c976c9c5a7ef4c3df361160a49fdf039079e4746675d5325d3a07fade4b5854c61c036c5c4e8ec552221881f2ac76a419165e71803b0fc6384359c2bb2dc1ef20fe7f03bb370432512ba129428689336e8aa5e25f6af89d95f7ca2bcdd721bbfe194f4d8f77d814cdc7115afb7a2ed82dbc541a354a4132d5100df8f8baf42bbe4db00c9faf2e5b43a308b8279d436431506af67d10e3ad3826564d57891456bd517c3ca0950fe2ff162bfcb3d41a5a9dcdf834c41217", 0xf1, 0x3}, {&(0x7f0000000640)="ea2a51bebc08784388ad89352398bb28a6940db3b9e61fbdf7fb5e220c13c36ef7bd73dbb3e9fa88208c442ee69f64aa0198a4e5553319cfc795fc0b0fd26aa09ed89bee237e238ccbdc7fcfa5635db0116a6644b7456e7b901c81e4e9da4eec6dbf43f9bb2fcdc744ec35a9d89fa76899995e25f199ee8a781f7961cf0f805e1f8729fd1d8965361e8da9171004ebe4ac9902ec16e2216cf933f70fc3801ff4de97165433eee3f51f9422ea0d51c4f8af181db15b2014fbaebd953437b1c449a5505411d4968000a9ff7c35f9940df7b1b6347213a9a50ed9c7ae2429c8f4da53f4236003f41de742a49ae84af5b926af03c3022f0d", 0xf6, 0x2}, {&(0x7f0000000740)="dad7a298043ea672aba459f7d4916cae7111f9a69c5e1b4965bf4d30bfb0ae5351868e968e75eda862f354a782f5e46bc66b02b75b8cb0fdc16e65abaca73588bea39bee16077cfc9729dc93188481355c869be6510b3d2e26391e24177f397bdfde1e14d32b9709cf378589e811827c418f11e4607b5048b2ffab774164f311aa7cb75483482a68d08351cb89594bc814632cba33eb0c9286b83103f6f374cce13e523749306f887161152fd96a096f6720fef76f11fac99a64b9287cce2ae4ec9c1d4c7635201eb86ea3c100e0adb52a5d3bedbe67b38255d290c7e142d5f8b5c1cee7d1b4b376cee1aa412af34f4e6c4e7e0dc17e", 0xf6, 0x5}, {&(0x7f0000000280)="18ccdae2ae1c134fbe85ffe70157b819f45405", 0x13, 0x5}, {&(0x7f0000000840)="e58ccde49f65a72b052565e90e28e815eea97363b8667aeec9f2c8dfe0e42672d602e0a84c32c3507f5874ac09ed9d577d47abc3d3313b92bef58ce300b0c0aa41b0d22345a69b5370c53710c846a769c1cbae4ca2d1370784b32286e47e288c2e81e80b1e953faf87cf573c2f3a423b1f37bb704b9375557e50f8689d5e829f4be6c894681d32b4010556210f8ab613830e82c598d829924fbd9e8ee7b5f6edf232b1be53e4bd548dbe3b69cd299761a9a65e25a7ca8b5435b7ab9b26b90c42e7c23a62afbc36887dc316bc843ce88cf01d70f953d9e3996e67eabecb96983adbdd393ab6d06d602d152316b2b726587daaa7c2a9", 0xf5, 0xbc6}, {&(0x7f00000002c0)="ba33bd7c368f6ade3efa56cfd7962941a89fe40802de33729eddbb59d8fcb8cdf7eeb657978c815b5441be1628e2d4010eb57b9cc8f341ebe900831c76db1613708b0dee6abcae08de2bc3343255ac541aa216413ed2b6b794fa0c", 0x5b, 0x1}, {&(0x7f0000000540)="2f46717d34b076cc77e5004166e25b", 0xf, 0x4}, {&(0x7f0000000940)="dff1f8093611449458746535875e32636b49cac5a4ce9a5311935036c4d4379b8dbb4178b648a623e83597b7ec7c77da43333a9574cf5aee398cb1802842d8ea0a5136514643a8b9ffd503f73d5e0e711b862ac3206243b0af224f0af41a8fe610e5c6341836d0b79859463cf8ad6ab44843a91df06c589c271edf4c1bdf81fa79d1a79552f55ef2281f7d31a2077b349e2aecb9c8192cb8bd825aebfbd26f8027defb93f54085af6f0d4ecb99773819a9a7e6f8cfd961033dde6a453218928d1701fc0b0ec5cbaea030c69a", 0xcc, 0x3}, {&(0x7f0000000a40)="b1030e58f184c7f3fda139a76ffbe0a479e2bdba5ff6327b4242f49e0ce434c31ae221b866f208f456b948801458c2ff3a35809adb8f64f5d64725ef918fb222349b", 0x42, 0x100000000}, {&(0x7f0000000580)="d60684a35d78226899d2bfad051d782812aca9bdf0c668f36f46800e3d2aeae01b729b2767717e2b9305f44777adc485df20209b33ea88ac098d4fd98a738ac9b6964de722", 0x45, 0x264}], 0x2074a0, &(0x7f0000000c00)='/proc/self/attr/current\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000c40)={'HL\x00'}, &(0x7f0000000c80)=0x1e) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'HL\x00'}, 0x0) 10:18:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 635.604146] FAT-fs (loop1): bogus number of reserved sectors 10:18:31 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 635.646278] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:32 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$set_timeout(0xf, r1, 0xfd45) close(r0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000040)={'syz1', "285e0bfed55aebb13174bb27bfedf170bdffabd3823cf98dd375ef3dfe58cd36e0c5417d1a35f687a10b1358bbc6ae166f245d07615f8cebff8c6a4b06754946aac45d80a6dca272aab53c3cdb2ce95bbf8c68996b2ea6d7af1023125c78c150f318a7156e0704cb5e95bcc1cb6bd99920e61fc53e240c013d549f1f447e156ec85540676885e1610cac57efe995d6be8e863dc57090597b6f2ede3b75fedc2b79ef37"}, 0xa7) 10:18:32 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x3}, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) accept4(r2, &(0x7f0000000140)=@tipc, &(0x7f0000000200)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:32 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x5, &(0x7f0000001380)=[{&(0x7f0000000080)="cacb48b51028811f31dfccfb4d969583071911b990478c9f56408e9c79fc208030f2306497ae12d82388426313d2195556057dc3f120dd1044f66c8b40c008d812e9e703bd40256ed15b3c8de6b43cb3d91d8355f9c69d26ca3ca1ef55957fc373ec78e9f6a1762ebb0ad9a0df62ba13aebe70a1705a9e24a005e3411a3c17949b196c4b6de364242e9424d8cdca78bbb2f357", 0x93, 0x800}, {&(0x7f0000000140)="d471c07e45da23d9ea86c1676892b0aa9578c860c102b38c826e12ae42d7bf8dd80fac87a11c4fcfc94bf1c1c27c30317d656e6dc990a5dd4514447ee089638b33f908dcba3584647f7b731f1c11e75402bb1db72f75f7c79b82c3b7d67b2b10b071d839a3adcbf45261fc8799e7e37af43a5defae08aa62acc49c84cdf10cf6c07ac8d5ace2848e1d7593389b60d17a495552", 0x93, 0x9}, {&(0x7f0000000200)="28cb292946dcb3a6b443fe52500b13c2489b181385aab97ff7447884ca8c0fda8cb6c515c74276ac37dc880cd319a64e59372ef0b773b269fe5b19b639716452d00a26e05208f6fd650f50cb4772edfff47bde183a5172f77946f5030492840e652dfdc11532eec97d707a4a5df4391e178683689593b594dd3391e207a62229976a3a", 0x83, 0xe566}, {&(0x7f00000002c0)="ec362fcec670c04b52b0885ccd2783ac7ae7d8fc0e0aee89b80061a38930cac5e530b99d8420b06c89baf09ba657b19e34bdb80c590f2c0260af495efd810f351054a28a8b9b7a02ae1118b2fa5ad70a0a35539b8167bdea3a7d259e03c829e67b8daea76a69b233de38782236cf06763824ed86b30bd4fd7a826a7d9c87bf26a31a950deaf3", 0x86, 0x2}, {&(0x7f0000000380)="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", 0x1000, 0x1aeabf31}], 0x4, &(0x7f0000001400)='(posix_acl_access\x00') close(r0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r1) 10:18:32 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000000c0)="cd0297897efe67475fc1558e7d88b750a369354e149d77cfa72cabb41e9470", 0x1f}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000000140)="999e08f4cbcaa1096cad31ce0bd528d90cce853adcb99d785b4140be652ba573f124054e8edb4d0bb247f062deec232b7487", 0x32}, {&(0x7f0000000180)="dd8dd7ece5de9140b23978dad5c28ef4fddd9c770e3767a222e73120212865a8aac0", 0x22}, {&(0x7f0000002880)="41872aff12386b71901860787104cba79fb2790aa9fc124089bbc67d726e82eda88a77ed0878e47f6558d11510d9acff57e1d90cae232993bb4e486283bf4524d6cf5f24a75ce1aeb0c1dbee87d075c98f5b8526c8783a331a47ac2790e120d5b63353bddeb5b13ee967603ddeff26e3bb700a83a394fc35fae02d47fd03f84c50fbae9b4c5910e335d2d0c2b4d32e2ad3d41b127e23fdcb273532a45b8c912d5b25fa6c268e7320aa4f6ecd93d2511bd8abd5a7bf8cf83f4f9f7fa56a1c454c3fd8f9e4eefdc2e4f12623765842524602e2f940264a1f792a654c95d03d0ef71dab03992c4544dd24543fc8d89bbfe362d8dd987a012ea289a4a0aada6b9e2243fc9208ba42491802cccf66d9ab801c22557187c0d3ae17147e7459a0e4abe910dd9037694e808b447bfd86628cbe202854c45c0ce905ea3a66b7e829eac578e0f169a3253235310f6b5caeaccd77b7818d0e306abb1cf38eb8b9d84c3b44dd0f401631e4db5ef4166bac88eec34834e42cf1c5eddc045d00edfc2efd1b59c7ce73c67aaf7c440941082d99cfd2d2dd6eddd03132a172394df3fa2a019ed47182ba26fc081d0a8e032c0cb3d4dba40160d038069d5de3b512b53a3a1ec7249b4716c3c74f348b655f7596db197a144e7de3b7b8f12dcee7729f90bdc62c0b6075b13bf090cadb270f484f51cbdec9821d80da846e03a16dee553f0de1ce84dc9afa0d74cb139f3697556e41b34618cff04fd1bae1c611cf53de866ddf34ecc1db888017fbb2f8b466a35ac264532c9c4beecab362ddd5a46967588b5e4e719cb16806fdd5e6bec7782f649584a0f9fde0831350d445545e97b8161c2568d2b93fac8d2168d52cad0bef302adc18e3e390894abf2ef61be8afdde91ef771b1f0be5c1af93dd25c69b5d2020c08a91bb1a8a880749dd80fff588a6ab05815f6a8adce01778d135023fa28e281fa766864cc07e1ee74435025d6b0549d95f5b15a34b38d16bc4f9bcc1c73f2183944aae00c5299675c4c6a86458dbc94df12c664492c7e0411011103b943624490f456de3490c4b9148e95035c42edabde5d0c24a718ec0113e1234cbc5c22d2df33ea5c8770a2cd01c353efd616fad95df99358a8e934bfb8a4ab02f67755deb0317aefa3d4c8a7611a2c231ab2382a00734a4a474f87f6f9a6bbfaf8a92f31261e31d4748f0180ff0389476b18d93e0022c23df9728ccd931e5e562a661fefc7a585f40eb1344ef416ed412b8048d10f8802f3c121c0b40eae826064ad634baab591d94582b826e243bc97d06dba2cf7ce22fca2124ba6a7d30a1f6bb438167ed0cd7836bcfe6b33aa06dfdbb4012ebd3e5478a4e239c5cad337679082384260de29958625787bf3c0ac9cba18a2f034930c7954d2cc48e3a155ac8e73268b66b2ef35421a5db1a5843b5ff7b46d63e26566d8995b8cccd71e1d992f68f6c286825e6cf4df1f8a5ef6963501f796419a04ce31724a38f2028d29b2646cf214537147103b5fa225ed868b1da286341b0bbb91efa1dec459713d413c6b6a040309c9f567ca22d3f6f99a13a94f38b711ffabfaccce8204cc949f3a209dda5a8d8519f2b38ccb2d6d94a4eeb135b1d3fe23b467607c8ec82f00edca53e58642ad243b244de18bd52392e453ecc7bc38c19a1c5243414b808d0ca10a34c635023fccf0cc037fb66220ebfb31a2d781d05d7f51890c24c4dd66415f5711ce0cdfde47a022e501efa267bce5bce7447aa12fb411cfe8f2a11fb64d502a626fbd25aa9a5045b421d5466a21f3a1ad36f9247fa05c5a9d034392ebc5f6a73588d93567da4bca32e07b49010f2843f34984068bb738dc932082f6dbdafac3b2a9f30fd08545e4da830cb1953e6d136e402001d2261ad6913cba63b427ff89456004cbc510619ac6806598d8e707419e7e5815e26016ed9c80b723e7d71de6cf06720b9644ea08823c714f0690e88e113798b4b78718719a9cc08be5113fa7e4288a90842f9da30a3445362a492c10e5061db142206f866c9c6981cec94dde4c95f7ed5fe0ccf0c6d342cc7f9196e9764da07402628f2dc5750b83f63e4a525c08f6709803044597be5812d27d2fa1839216ddee664994e306c2a4b0163e452094a8c54be545eb146baac702f909e7fbcf29e91c79bc4ce7c66c7bed3d2c120c616f10a24f6dd4915901afc596cbd583ea8908f3a62fc36e15194013d5478fd47682c66669e1ce63b998fee99c87977ecb4be4446491be39ad4f5595369319a2e266ac6784165019ab9a6c0938625e80f9ce68ad2b763934210d326ff705a17107741a9b65bf82e27c9f4182de6d53e7c79db3a59b121b7acd75635293b99af27e2aac0729ce28adfa3fe6796b9d5d4a6a5da69b3fc18d44e9f89ea7688b697b4f0a21bb0c16d7508e705f7b68dcf72d844c08ed0ada98bf48d80f611fccb68651a72ef91b5442ba91a379189b2dfc870edcf5934c6a64c226878813bf48828609d4c4022a8b97756edbe536946a2a0dddcc6a5f6837892c60eb38d4a3043eae31d268b50c45bfcc9e298c67e96fceea8e32cd8ff3d87af9553768f025eddda48fc9674f94c914c45eb781fcf9922ed34e17b27b7838cac004d84f4b39c7e9063bf0f57e95a946df0ef3b97788d8414f9c06e54cc4deb3535c3d863100e098e65a2f3542f8f5a91aaf6b0e42973af9ebf50d00d2d44252a364727b1b7ca220fcdbd66e38ea80ed9f877f0aa1bfa728da137ffcd322006065685df30d78f5e2be4f3623b7fcd9880daa81d186afa929e7d464ed81d1fab25707b15837984eacfe9f90e34dd7125dd53098de9f49adddee1e055fb5118defdf7a1c898b57421125129e602531f07598075cb1d140d02d89a4ba17e571b0f733dff0aaaf8473b6c004cb2c4a2b58fd5c6f2c6bc96a8c7b8c4ea5d4ca45390b35d8221fcbb13bcbd7e1ffcad194397038526709e520c6716fbb6cb8ce9928ad1b870268983a3fb3c27b146397c0634c356accda495521c3b92f240c6f3ae2910d4c8ae1f7a39ae5a3bfaca935ba98700d550c031cfcd664826f6223dc72bc64be34ef7ee489260f6f6dbc7369b3a2a50b3c625c18a21420eb47bf1bd2caa9b99aeedd144135d8490a41bfe680e972190cffd4662c6fd676dc8cb7e34e2e360daa1adcf1c88c501a305cee00524054dc2ef6493436a4ec36749b53357f5ff38d2a4a94eb7258e4a05b18cb0d88843a3be91e6195f428b58c7c83b939a0e6be345f91a6041a5da94c7c94c57623fb480185a43f6b128c7ca03b0c0cb83725c41846357e8e8b962112cc337d9ef01f87f39cd9523abaf8aec3dab3d693173cf8fc96c0da7ac92da24d7b447f6fe359309e1cf76c39fd02654c908fe574cbce4a90ac21a3a07d4d94cff48b98da18b5faae3036d8f1cb67718573d58d3c9d0d3592c544befd280ada7af34cd7b2b7a68680c276b5ec7876b7fa5e861f37eca27e62aae38bae96df8c1a5bdb3d3db07c1088c88ea8549c197728e511260caa5e9dc676498505670c07bcd00cc2fadc44d751bd15291e8803853c103e5cc1d49493f741a17165b0d8c4e8114b0a8b20ff4d9215aa5536aa1980bfb3db149e2f88e4a0a346126e0dea0b73dbb2a670367a6fcbdee1632db3c3869020e08147471dad9f0937fc760461387a40cbf059904a829949df131ed839740f31d19232b07e0e676eb862dd92fd0ad3d67814fbc407b19104f371abba995b2cf2365b65e09451647d0ca11bbd70b925505bbc309f24cca600d98c6d0b09c8201e9960631f52c030875256a4a30733486672a05ed1d67e6ee42d4ea41def7b4a356005a54be053a107c5df4e27b7297a7672e9b7f84fefb3cd77bed404b7a3454980e8ad78920e1ed45270a0f737fe1ae892ba5cc643cfab1c824da2023d70892b322f9f6c99a89685ad940da7af13f4aaccb1c675763a9e33a4fd8a07c4f9b030d166dd56cab9e881f2bf966c82638b0073c19488a2a2f09f77ad3edde360e8ff9396f59e6d8819e6bbd22cb904deb7ed0fe1d4889cfadc96526b331af197ad1693016fb983d7ade4ddca8676bcd9cf27fcde1bb7ebb9f885cf4e5706478987568fb2b5e2833c1023aaf78b0964e6d7c0b7ac7f602895d708bc78b3a73a11f5325d14f355643c12dc7f6718032c1c94549b385182a7465d09d98c119d51ca0dfc3c05b79ac9d3152ebea818d2c03df78eb5cfe8ff7c7e6f9874fedc508c03ba0a5ce7b48542e09cd470173c22988697d1e25a016273413e55ad433b0769bc72ef75cf5769fbd694f0da7f75acddb764d602e5e745f2196b0d3b990c845fa9717aca039e69f3d9e582bf52946a94df548b6d0f1759665281772a475cb0e3ab499c277f6cf32668183a257d144be4a030f4c18d733976be452f0fd95a2f3e40eff54ad0b5681b933b7e08b71c0cdfd9a9f8201f226f0716ed573913759ff77b8daa3b9a0ea49c8b5c3f983d5c4112ba653afdffe92f514f1bf186d7ab4f8ff506b842fef39d0ec79e0e05337d15e0b452c122b7a43dd7fd85f2f09d4051773b4d66e7cee8cf910fb4166cb71e0ea725a1861137cabf4b5bd7089f6a62b22dec2f2dea1aaf7c50e1fb7b3990bc4c0ab25415c78c87d952e9e07561dd2345eab9a53131457a5322a4c990ab52e7433ab123e590d3a02ee869bac13f7e9d642827edc5dba830c798942130ec89c0c4aeda1fe46381fbed58a6a65c4193574b0dd928d4741a88a9688527d4e7ca3f93affd93db578346afc2d1859a87c88052bc6ecc632360f90ce20c43f2c41c81094332eabba711462ca3bac7df7c92bfe1058f0a7b5efe75ec28f097e017d080f703837c016cd022b0468c2bd4ecd61b40a1fabaf9d0f29e56b76b35d6c4b390b02e46e2169916868f97eb5df17a384e6eac8dcbe6c39271281585e163bd7614fc2b476349450386d38889958464c3be66982f7c3038c6194dfb5c7f81002b73c79804ade6d96a7ad81228e9b8f4ed37f65dffe4b12abae1eb1665c55fdd79e04f627f0e416983c8229980ada31dbcef390d47ad5feb486d6a01fd97796957505da21fb6a295c4a7ad45072d962fc8d94dc768e57bcb18073ecef47a16747db6efd2a5ab0b2f757dfceba6dad51723d2a85022ed08abafed428657c15f1afd755d092044cf480ba6ec264e1a7e8bd1a1e0b2b4acb4bf457a3905883c863210fc53c05a1b788a7557dc3faa67c227738063a34c20a380d8c449195ec751520121ffe0d2ef7c86442c1515fd9b44af1ee2cef11d3c2ce64f7fa223d36965a997442d485685ec05e501783f02dd1b7732150c78b8f29fe453a7225fe4c82dc2c004d020fe69793022f66b9c164e0659ac7b03bc9fbcefe5cd0788a0b137efeb710218abafc00769cff7b8e89b57b5fd1dca588bb0e6f51052525a314e96195a3ccb975eafcdbf97b507b9c6d80637e3cc0a7e49d14da1bd4441f88e41836726eb15e3ff1b7eac0753f25927ae6adcf497c3a0a978d7dc51aac8a0a0b4378627ff660c5a73077edb4bddd6ac401900deb7629d85f7e5207779d23e81487e06084c954fbbd2991036bb33d2e0abe47e1a895b092de92f8f93131fbf62677e4f8d6707306136287727c788861a9ef94f19d254dd6eac3512dd80510e2259ef5f6130282601dcd9e33d2c7b225ceab3e5f868784abd52d1e4ea7bd22a69d7e3f4ebf72a188ff4ba5f6f0704edaf8ab9b503dd00a5cbdbf73a6ccf78add6d2ec12b9e95ca94a9eb556056c5d9f73fda2b12839dfafa676968399daf80d3ecaff14", 0x1000}, {&(0x7f0000001200)="f5a0eefa2bf99626dae3c6d3fadc19a263c6dadf0685b0030316", 0x1a}, {&(0x7f0000001240)="635793a282f6b8", 0x7}, {&(0x7f0000001300)="1d532178fa77545ee173e3e3cda967e83e08beec0e4855d4e72520b8b9415f19cc62204e5754421638745407d3f2c649b5dfd344b98358", 0x37}, {&(0x7f0000001340)="bd3c997b", 0x4}, {&(0x7f0000001380)="1746aedeaecfe2995db8a14e65293df901c75ac258fbd0792eafd8f45e05100f0b663c3d96735f", 0x27}], 0xa, &(0x7f00000014c0)=[@ip_retopts={{0x10c, 0x0, 0x7, {[@cipso={0x86, 0x71, 0xe56c, [{0x0, 0x12, "1e836c775c3cd87b310211dbdbad9098"}, {0x1, 0x8, "e5f6f4bc38a4"}, {0x0, 0xd, "d5d0990b676c5acd65af98"}, {0x0, 0xa, "db0bb725dde178ba"}, {0x2, 0x7, "72169c319c"}, {0x0, 0xb, "840e8073dd634b486d"}, {0x1, 0x10, "9b5337101be67647411d92ae928e"}, {0x6, 0x7, "f395bbe1e9"}, {0xf, 0x11, "50423fe69df413c0bd045867e6e957"}]}, @generic={0x83, 0xd, "a20b65202d73d506adc993"}, @ssrr={0x89, 0x1b, 0x4, [@local, @multicast1, @rand_addr=0x6, @remote, @dev={0xac, 0x14, 0x14, 0x1a}, @multicast1]}, @cipso={0x86, 0x43, 0x8, [{0x5, 0x11, "59c9150499e4c69879374d55b81b96"}, {0x3, 0xe, "afc09dc26495da6c69cb59cd"}, {0x7, 0x10, "2cb654e4d3f3f8f0c1eec0db42e0"}, {0x7, 0xe, "c7535c8a462c8f178b6f51fe"}]}, @generic={0x94, 0xb, "ba7a531f26726e9cbc"}, @lsrr={0x83, 0x7, 0x8, [@broadcast]}, @timestamp={0x44, 0xc, 0x40, 0x0, 0xc, [{[@multicast2]}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef77}}], 0x128}, 0x4040000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000003880)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 636.457433] FAT-fs (loop1): bogus number of reserved sectors [ 636.485871] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r4 = dup(r3) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000400)={{}, 0x1000}) close(r0) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) recvfrom$inet6(r5, &(0x7f0000000000)=""/115, 0x73, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @local, 0x81ed}, 0x1c) 10:18:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:32 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), 0x4) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0xfffffce7, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r8, 0x0) io_setup(0x83, &(0x7f00000003c0)) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xa93f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="0fae050f015c27d0ad00000f20e06635040000000f22e03e660f3a0953f9056467f2af0f01ca66b8c10000000f23c00f21f86635030005000f23f80f20e06635002000000f22e0baa100b80000ef", 0x4e}], 0x0, 0xcffa808b513f9dfd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) close(r3) 10:18:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x48002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x4000, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000240)={0xdd0af216fa440f10, &(0x7f0000000180), 0x1a, r4, 0x4}) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, &(0x7f00000000c0)={{0xc5, 0x6, 0x3f, 0x1, 0x0, 0x80}, 0x8}) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 637.397025] FAT-fs (loop1): bogus number of reserved sectors [ 637.409013] FAT-fs (loop1): Can't find a valid FAT filesystem [ 637.458671] kauditd_printk_skb: 15 callbacks suppressed [ 637.458686] audit: type=1800 audit(1576318713.735:435): pid=30087 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16961 res=0 [ 637.467129] audit: type=1804 audit(1576318713.745:436): pid=30087 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/872/file0/file0" dev="sda1" ino=16961 res=1 10:18:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f00000000c0)={0x5, 0x0, 0x4, {0x2, 0x45e9, 0xa68, 0x2}}) 10:18:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 637.768824] audit: type=1800 audit(1576318713.745:437): pid=30087 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16961 res=0 10:18:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xa93f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="0fae050f015c27d0ad00000f20e06635040000000f22e03e660f3a0953f9056467f2af0f01ca66b8c10000000f23c00f21f86635030005000f23f80f20e06635002000000f22e0baa100b80000ef", 0x4e}], 0x0, 0xcffa808b513f9dfd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) close(r3) 10:18:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 638.373415] FAT-fs (loop1): bogus number of reserved sectors [ 638.409242] FAT-fs (loop1): Can't find a valid FAT filesystem [ 638.464812] audit: type=1800 audit(1576318714.745:438): pid=30123 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16961 res=0 [ 638.489258] audit: type=1804 audit(1576318714.745:439): pid=30123 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/873/file0/file0" dev="sda1" ino=16961 res=1 [ 638.517426] audit: type=1800 audit(1576318714.755:440): pid=30123 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16961 res=0 [ 638.608543] audit: type=1800 audit(1576318714.885:441): pid=30107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17649 res=0 10:18:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:35 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) r4 = openat(r3, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x80) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000000200)={0x7f, 0x1, 0x1000, 0x80000000, &(0x7f0000000140)=[{}]}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$PPPIOCGDEBUG(r5, 0x80047441, &(0x7f0000000180)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r6 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r6, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r6, &(0x7f0000001880)=""/4096, 0x1000) 10:18:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 639.244245] FAT-fs (loop1): bogus number of reserved sectors [ 639.252270] FAT-fs (loop1): Can't find a valid FAT filesystem [ 639.303613] audit: type=1800 audit(1576318715.585:442): pid=30156 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17569 res=0 10:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 639.461822] audit: type=1804 audit(1576318715.585:443): pid=30156 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/874/file0/file0" dev="sda1" ino=17569 res=1 10:18:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000180)=0x10) 10:18:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 639.618257] audit: type=1800 audit(1576318715.585:444): pid=30156 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17569 res=0 10:18:36 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e22, @remote}, 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f0000000180)=[0x4], 0x2) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) ioctl$TIOCNXCL(r1, 0x540d) 10:18:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:36 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) r1 = socket$inet6(0xa, 0x3, 0xff) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)={r6, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000140)={r9, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000480)={r9, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r11 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r10, 0xfffffffffffffefe) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r12 = socket$inet6(0xa, 0x400000000001, 0x0) r13 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r14 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r14, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r13, 0x84, 0x7b, &(0x7f0000000300)={r15, 0x874}, &(0x7f0000000340)=0x8) close(r12) r16 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r16, 0x200004) sendfile(r12, r16, 0x0, 0x80001d00c0d0) r17 = socket$inet6(0xa, 0x400000000001, 0x0) close(r17) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r18 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r18, 0x200004) sendfile(r17, r18, 0x0, 0x80001d00c0d0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x90800, 0x0) getsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @broadcast}, &(0x7f0000000040)=0xc) setsockopt$packet_add_memb(r16, 0x107, 0x1, &(0x7f0000000080)={r19, 0x1, 0x6, @local}, 0x10) close(r1) 10:18:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:36 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) r2 = semget(0x2, 0x1, 0x83) semctl$GETNCNT(r2, 0x1, 0xe, &(0x7f00000000c0)=""/50) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 640.226245] FAT-fs (loop1): bogus number of reserved sectors [ 640.256349] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:36 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:36 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000180)={0x2, 0x0, 0x3}, 0x10) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) connect$packet(r5, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r5, &(0x7f0000001880)=""/4096, 0x1000) 10:18:37 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) r1 = socket$inet6(0xa, 0x3, 0xff) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)={r6, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000140)={r9, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000480)={r9, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r11 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r10, 0xfffffffffffffefe) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r12 = socket$inet6(0xa, 0x400000000001, 0x0) r13 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r14 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r14, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r13, 0x84, 0x7b, &(0x7f0000000300)={r15, 0x874}, &(0x7f0000000340)=0x8) close(r12) r16 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r16, 0x200004) sendfile(r12, r16, 0x0, 0x80001d00c0d0) r17 = socket$inet6(0xa, 0x400000000001, 0x0) close(r17) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r18 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r18, 0x200004) sendfile(r17, r18, 0x0, 0x80001d00c0d0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x90800, 0x0) getsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @broadcast}, &(0x7f0000000040)=0xc) setsockopt$packet_add_memb(r16, 0x107, 0x1, &(0x7f0000000080)={r19, 0x1, 0x6, @local}, 0x10) close(r1) 10:18:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000180), 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 641.159927] FAT-fs (loop1): bogus number of reserved sectors 10:18:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 641.205050] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:37 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000009c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) r2 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) r6 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, 0x0, &(0x7f0000000300)) r7 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000200)) r8 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r8, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r8, &(0x7f0000001880)=""/4096, 0x1000) 10:18:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) r1 = socket$inet6(0xa, 0x3, 0xff) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)={r6, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000140)={r9, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000480)={r9, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r11 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r10, 0xfffffffffffffefe) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r12 = socket$inet6(0xa, 0x400000000001, 0x0) r13 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r14 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r14, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r13, 0x84, 0x7b, &(0x7f0000000300)={r15, 0x874}, &(0x7f0000000340)=0x8) close(r12) r16 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r12, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r16, 0x200004) sendfile(r12, r16, 0x0, 0x80001d00c0d0) r17 = socket$inet6(0xa, 0x400000000001, 0x0) close(r17) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r18 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r18, 0x200004) sendfile(r17, r18, 0x0, 0x80001d00c0d0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x90800, 0x0) getsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @broadcast}, &(0x7f0000000040)=0xc) setsockopt$packet_add_memb(r16, 0x107, 0x1, &(0x7f0000000080)={r19, 0x1, 0x6, @local}, 0x10) close(r1) 10:18:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000180), 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 642.122469] FAT-fs (loop1): bogus number of reserved sectors [ 642.144549] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:38 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000340)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r3) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000300)={r8, 0x400}, 0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$SIOCGIFMTU(r9, 0x8921, &(0x7f0000000180)) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) 10:18:39 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r17, 0x200004) sendfile(r16, r17, 0x0, 0x80001d00c0d0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x90800, 0x0) getsockopt$inet_pktinfo(r17, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @broadcast}, &(0x7f0000000040)=0xc) setsockopt$packet_add_memb(r15, 0x107, 0x1, &(0x7f0000000080)={r18, 0x1, 0x6, @local}, 0x10) 10:18:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) 10:18:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000180), 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 643.146372] FAT-fs (loop1): bogus number of reserved sectors [ 643.166040] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) 10:18:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) [ 643.196834] kauditd_printk_skb: 11 callbacks suppressed [ 643.196849] audit: type=1800 audit(1576318719.475:456): pid=30332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17034 res=0 [ 643.327934] audit: type=1804 audit(1576318719.515:457): pid=30332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/878/file0/file0" dev="sda1" ino=17034 res=1 [ 643.420868] audit: type=1800 audit(1576318719.515:458): pid=30332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17034 res=0 10:18:39 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0xc000000000000000}, 0xf) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x100, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x7}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000380)={r2, r5}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000180)=0x10) r6 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, 0x0, &(0x7f0000000300)) r7 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f00000001c0)={0x9, 0x3f1, 0xfa00, {r8, 0xf5, "85bfdd", "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"}}, 0xffffffad) 10:18:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:40 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r17, 0x200004) sendfile(r16, r17, 0x0, 0x80001d00c0d0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x90800, 0x0) getsockopt$inet_pktinfo(r17, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @broadcast}, &(0x7f0000000040)=0xc) 10:18:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:40 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{0x0}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r6, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000002030501ff0080dffdffff270a0600000c00010001380800400a00010c000300003017cd3f0022ff"], 0x2c}}, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000140)={r3, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x40000) [ 644.091027] FAT-fs (loop1): bogus number of reserved sectors [ 644.119839] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2}]}, &(0x7f0000000180)=0x10) [ 644.148139] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 644.165914] audit: type=1800 audit(1576318720.445:459): pid=30381 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16881 res=0 10:18:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x1}, 0x20) [ 644.201853] audit: type=1804 audit(1576318720.475:460): pid=30381 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/879/file0/file0" dev="sda1" ino=16881 res=1 [ 644.234882] audit: type=1800 audit(1576318720.475:461): pid=30381 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16881 res=0 10:18:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x20) 10:18:40 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xd09f4e530dc35eb0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f0000000480)) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x4}]}, &(0x7f0000000180)=0x10) 10:18:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 644.577749] hugetlbfs: Bad mount option: "/dev/zero" [ 644.808379] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 644.827567] audit: type=1800 audit(1576318721.105:462): pid=30389 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16769 res=0 10:18:41 executing program 3: perf_event_open(&(0x7f0000940000)={0x5, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = socket$inet(0x2, 0x80000, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @dev={[], 0x26}}, 0x14) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) name_to_handle_at(r7, &(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000000400000030b553627ddd64d0ba2b058c0d36a7ce01b88e8a5e13658def81f715d40fc3386e38fceda60e234f939c17a165928a94d38a3c0e52e119a7a1a02951579ff3f9f3fead5ba7d031d7da3473d34fb1efd04780b4165bdbe0d1a837d968b322587c782623447f8ebf407487195282c5e4284b0e3b615677d80b6e63f1ac293001f427a1f294fee229d61afe3f9aec96f2d95334efac6d5ddb409f9fc81877a4ad07702498aaa8e7014deb69cb2558fca34e1d1d7d84b58f86a7466296728e8355777b0a1fddadfe3a63759af40fb14eb22512e8ff54a5941d5e420af95594263392b5fdfc4b27fe61fbea73b61897dfba1257a64e8ec5de3a11931ee9725b685a63499197b3fd97433e1f0c3ff0ec79fbeff1c6ca4624e0cb84183dda39feebe047317d6fd591a0afe55e4ecb1d0859da8e1e12160e32244dbf4b152e763c5bde216f527f526626ea262853ed0893c376a3b598e3dda431924cc5bdaf7485cfbf6cf5ce7cc81f1a8fa05235a457431b4084744bf426c47439be151c646c8c5c0c4f7cc739974332a471834dd5da714b2d9a42c4a631b02462413eb7303cc1b0909f834d23a4b6a2ec32c5b995c45eb6119bc05079169f03351f4bc44d19de131dfbd2ee1ea1e778ef4f1482694caba2ea24c1c6fbb416c07c095ca07fa9bf1be05522377c"], &(0x7f0000000340), 0x1400) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$KVM_SET_ONE_REG(r5, 0x4010aeac, &(0x7f00000000c0)={0x2, 0x7}) 10:18:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) 10:18:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:18:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000040)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000440)=""/189) dup2(r2, r2) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000300)={@remote, r4}, 0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x12, r4}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @remote}}, [0x7ff, 0x1, 0xb787, 0x80000000, 0x2, 0x9, 0x5, 0x9, 0x5, 0x5b1, 0x7ff, 0x67b5, 0xffffffffffffffff, 0x100000000, 0xff]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r5, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0xff, @local, 0x4}]}, &(0x7f0000000180)=0x10) 10:18:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{0x0}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:41 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r17, 0x200004) sendfile(r16, r17, 0x0, 0x80001d00c0d0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x90800, 0x0) 10:18:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x6}]}, &(0x7f0000000180)=0x10) [ 644.992348] FAT-fs (loop1): bogus number of reserved sectors [ 644.992401] FAT-fs (loop1): Can't find a valid FAT filesystem [ 645.023367] audit: type=1800 audit(1576318721.305:463): pid=30432 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16529 res=0 10:18:41 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xd09f4e530dc35eb0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f0000000480)) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) [ 645.024282] audit: type=1804 audit(1576318721.305:464): pid=30432 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/880/file0/file0" dev="sda1" ino=16529 res=1 10:18:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x7}]}, &(0x7f0000000180)=0x10) [ 645.024508] audit: type=1800 audit(1576318721.305:465): pid=30432 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16529 res=0 [ 645.285032] syz-executor.5 (30447) used greatest stack depth: 21744 bytes left 10:18:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000000)={r8, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000100)={r9, 0x8}, &(0x7f00000001c0)=0x8) r10 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r10, 0x200004) sendfile(r2, r10, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e20, @broadcast}], 0xb) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000180)=0x10) 10:18:41 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xd09f4e530dc35eb0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f0000000480)) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x8}]}, &(0x7f0000000180)=0x10) 10:18:42 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r17, 0x200004) sendfile(r16, r17, 0x0, 0x80001d00c0d0) 10:18:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x9}]}, &(0x7f0000000180)=0x10) 10:18:42 executing program 4: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) process_vm_readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/179, 0xb3}, {&(0x7f0000000280)=""/206, 0xce}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/253, 0xfd}, {&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f0000001580)=""/98, 0x62}], 0x7, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000180)=0x10) 10:18:42 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x8, 0x0, 0x0, 0x0, 0x19d, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000140)={0xb, 0x3, {0xa77237f98f465c85, 0x1, 0x5, {0x1, 0x1}, {0x329f, 0x8}, @rumble={0xfff7, 0x8}}, {0x57, 0x7fff, 0x40, {0x4, 0x3}, {0x3, 0x2e39}, @const={0xd1, {0x8001, 0x590, 0xe6, 0x1}}}}) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@remote, @empty, @empty, 0x9d4, 0x40, 0x0, 0x100, 0x0, 0x20, r4}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000340)={0x9, 0x0, [{0xc0000005, 0x18, 0x1, 0x26, 0x7}, {0x14, 0x20, 0xafe4, 0xebe7, 0x2}, {0x7, 0x5177, 0x9, 0x10000, 0x10000}, {0x80000007, 0x7, 0x7, 0x7, 0x5}, {0xd, 0xffffff00, 0x2, 0xc51f, 0x81}, {0x6, 0x6, 0xfffffffc, 0x9, 0x2}, {0xd, 0x8, 0x0, 0x5, 0x95}, {0x80000000, 0x20, 0x8, 0xe36c, 0x3}, {0xc0000001, 0xffff, 0x81, 0x80000001, 0x6}]}) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r5, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r5, &(0x7f0000001880)=""/4096, 0x1000) 10:18:42 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xd09f4e530dc35eb0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f0000000480)) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{0x0}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 646.061979] FAT-fs (loop1): bogus number of reserved sectors [ 646.114653] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0xa}]}, &(0x7f0000000180)=0x10) 10:18:42 executing program 4: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x1fd770853a6c6817) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x0, 0x2, 0x322e0433, 0x7e8, 0x3, 0x2, 0x3, 0x10001, 0xffff, 0x1fa, 0x9, 0x9, 0x1f, 0x100000001, 0x4]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r1, 0xfffffff7, 0x5}, &(0x7f0000000100)=0xc) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000180)=0x10) 10:18:42 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xd09f4e530dc35eb0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f0000000480)) 10:18:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x362c1503c0dfb9d5) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0xfff, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xfffffffffffffdff, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) 10:18:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0xb}]}, &(0x7f0000000180)=0x10) 10:18:42 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x4200, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4bd}, 0x0, 0x10, r0, 0x9) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000180)={0x0, {0xfffffff8, 0x5}}) r2 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r5, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2}, 0x14) getdents64(r5, &(0x7f0000001880)=""/4096, 0x1000) 10:18:43 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r17, 0x200004) 10:18:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0xc}]}, &(0x7f0000000180)=0x10) 10:18:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000180)=0x10) 10:18:43 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xd09f4e530dc35eb0, 0x0) 10:18:43 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 647.088493] FAT-fs (loop1): bogus number of reserved sectors 10:18:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0xd}]}, &(0x7f0000000180)=0x10) 10:18:43 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0xe43}, &(0x7f0000000140)=0x8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) [ 647.132564] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:43 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r2, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @dev={[], 0x23}}, 0x14) getdents64(r2, &(0x7f0000001880)=""/4096, 0x1000) 10:18:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @empty}], 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0xfffffffffffffe4e) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r3, 0x6, 0x5, [0xfeff, 0x8, 0x4, 0x21, 0x6]}, &(0x7f0000000100)=0x12) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r4, 0x68, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x7ff, @ipv4={[], [], @empty}, 0x6}, @in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @empty}]}, &(0x7f0000000180)=0x10) 10:18:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0xe}]}, &(0x7f0000000180)=0x10) 10:18:43 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r5, 0xe43}, &(0x7f0000000140)=0x8) 10:18:44 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r16, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) 10:18:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0xf}]}, &(0x7f0000000180)=0x10) 10:18:44 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) flock(r1, 0xd) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:44 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 10:18:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x10}]}, &(0x7f0000000180)=0x10) [ 647.969316] FAT-fs (loop1): bogus number of reserved sectors 10:18:44 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) [ 648.019661] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:44 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000140)=0x2, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r4 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x400, 0x80040) ioctl$SNDCTL_DSP_SPEED(r4, 0xc0045002, &(0x7f0000000200)=0x9) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$set_timeout(0xf, r5, 0x800) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000240)=0x1) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) 10:18:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x11}]}, &(0x7f0000000180)=0x10) 10:18:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x4, 0x2, 0xfffffff7, 0x0, 0x7, 0x2, 0x1}, 0x20) 10:18:44 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e1f, 0xfffffffb, @dev={0xfe, 0x80, [], 0x28}, 0x2000003}]}, &(0x7f0000000600)=0x10) 10:18:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x12}]}, &(0x7f0000000180)=0x10) 10:18:45 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:45 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) write$FUSE_LSEEK(r1, &(0x7f0000000340)={0x18, 0x0, 0x5, {0x4204}}, 0x18) r2 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x444004) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={r8, 0x400}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000200)={r9, @in6={{0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, [0x1, 0x101, 0x4, 0x2, 0x60, 0x4, 0x80, 0x4, 0x5, 0x2f38, 0x2, 0x6, 0x2, 0x6]}, &(0x7f0000000300)=0x100) 10:18:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x13}]}, &(0x7f0000000180)=0x10) 10:18:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x140) 10:18:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x6, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) [ 648.893126] FAT-fs (loop1): bogus number of reserved sectors [ 648.921758] FAT-fs (loop1): Can't find a valid FAT filesystem [ 648.969339] kauditd_printk_skb: 10 callbacks suppressed [ 648.969353] audit: type=1800 audit(1576318725.245:476): pid=30633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16929 res=0 10:18:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) socket$inet6_sctp(0xa, 0x5, 0x84) 10:18:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x14}]}, &(0x7f0000000180)=0x10) [ 649.098165] audit: type=1804 audit(1576318725.255:477): pid=30633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/884/file0/file0" dev="sda1" ino=16929 res=1 10:18:45 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 649.228256] audit: type=1800 audit(1576318725.255:478): pid=30633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16929 res=0 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:18:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) [ 649.694389] audit: type=1800 audit(1576318725.975:479): pid=30643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17084 res=0 10:18:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x29, 0xa, &(0x7f0000000000), 0x20) 10:18:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x15}]}, &(0x7f0000000180)=0x10) 10:18:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) creat(&(0x7f0000000280)='./file0\x00', 0x0) 10:18:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:46 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) 10:18:46 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80080, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000140)=""/124, &(0x7f0000000200)=0x7c) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x8}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000001540)) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2a0bf4bfb3ecae97}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r6, 0x318, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0x45) connect$packet(r4, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r4, &(0x7f0000001880)=""/4096, 0x1000) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x1100, 0x0) 10:18:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x2, &(0x7f0000000000), 0x20) [ 649.837129] FAT-fs (loop1): bogus number of reserved sectors [ 649.874866] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) [ 649.939707] audit: type=1800 audit(1576318726.215:480): pid=30682 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17087 res=0 [ 649.986324] audit: type=1804 audit(1576318726.245:481): pid=30682 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/885/file0/file0" dev="sda1" ino=17087 res=1 10:18:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x3, &(0x7f0000000000), 0x20) 10:18:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x16}]}, &(0x7f0000000180)=0x10) [ 650.039484] audit: type=1800 audit(1576318726.245:482): pid=30682 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17087 res=0 10:18:46 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) open(0x0, 0x0, 0x0) [ 650.249510] FAULT_INJECTION: forcing a failure. [ 650.249510] name failslab, interval 1, probability 0, space 0, times 0 [ 650.292979] CPU: 1 PID: 30710 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 650.301124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.310679] Call Trace: [ 650.313303] dump_stack+0x197/0x210 [ 650.316974] should_fail.cold+0xa/0x1b [ 650.320997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.326253] ? lock_downgrade+0x880/0x880 [ 650.330445] __should_failslab+0x121/0x190 [ 650.334702] should_failslab+0x9/0x14 [ 650.338522] __kmalloc+0x2e2/0x750 [ 650.342098] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 650.347771] ? fput+0x128/0x1a0 [ 650.351073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 650.356712] ? strnlen_user+0x15f/0x1e0 [ 650.360739] ? __x64_sys_memfd_create+0x13c/0x470 [ 650.365616] __x64_sys_memfd_create+0x13c/0x470 [ 650.370316] ? memfd_fcntl+0x1750/0x1750 [ 650.374587] ? do_syscall_64+0x26/0x620 [ 650.378598] ? lockdep_hardirqs_on+0x415/0x5d0 [ 650.383528] ? trace_hardirqs_on+0x67/0x220 [ 650.387934] do_syscall_64+0xfd/0x620 [ 650.391784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.397093] RIP: 0033:0x45a909 [ 650.400322] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.421393] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 650.429143] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a909 [ 650.436435] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 10:18:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x4, &(0x7f0000000000), 0x20) [ 650.443747] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 650.451069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6960be36d4 [ 650.458620] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x17}]}, &(0x7f0000000180)=0x10) 10:18:46 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 650.707969] FAULT_INJECTION: forcing a failure. [ 650.707969] name failslab, interval 1, probability 0, space 0, times 0 [ 650.759858] CPU: 0 PID: 30725 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 650.767814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.777190] Call Trace: [ 650.777216] dump_stack+0x197/0x210 [ 650.777239] should_fail.cold+0xa/0x1b [ 650.777256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.777272] ? lock_downgrade+0x880/0x880 [ 650.777298] __should_failslab+0x121/0x190 [ 650.783750] should_failslab+0x9/0x14 [ 650.783768] kmem_cache_alloc+0x2ae/0x700 [ 650.783785] ? __alloc_fd+0x44d/0x560 [ 650.783803] ? shmem_destroy_callback+0xc0/0xc0 [ 650.783815] shmem_alloc_inode+0x1c/0x50 [ 650.783827] alloc_inode+0x64/0x190 [ 650.783840] new_inode_pseudo+0x19/0xf0 [ 650.783854] new_inode+0x1f/0x40 [ 650.783867] shmem_get_inode+0x84/0x780 [ 650.783885] __shmem_file_setup.part.0+0x7e/0x2b0 [ 650.783907] shmem_file_setup+0x66/0x90 [ 650.807515] FAT-fs (loop1): bogus number of reserved sectors [ 650.809341] __x64_sys_memfd_create+0x2a2/0x470 [ 650.809362] ? memfd_fcntl+0x1750/0x1750 [ 650.817236] FAT-fs (loop1): Can't find a valid FAT filesystem [ 650.818208] ? do_syscall_64+0x26/0x620 [ 650.859081] audit: type=1800 audit(1576318727.135:483): pid=30732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17281 res=0 [ 650.860847] ? lockdep_hardirqs_on+0x415/0x5d0 [ 650.860864] ? trace_hardirqs_on+0x67/0x220 [ 650.860884] do_syscall_64+0xfd/0x620 [ 650.860906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.860917] RIP: 0033:0x45a909 [ 650.860931] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.860939] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 650.860952] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a909 [ 650.860959] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 10:18:47 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) 10:18:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x5, &(0x7f0000000000), 0x20) 10:18:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x18}]}, &(0x7f0000000180)=0x10) 10:18:47 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) 10:18:47 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x19}]}, &(0x7f0000000180)=0x10) [ 650.860971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 650.866898] audit: type=1804 audit(1576318727.135:484): pid=30732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/886/file0/file0" dev="sda1" ino=17281 res=1 [ 650.870836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6960be36d4 [ 650.870844] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 651.104069] FAULT_INJECTION: forcing a failure. [ 651.104069] name failslab, interval 1, probability 0, space 0, times 0 [ 651.141422] CPU: 1 PID: 30749 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 10:18:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1a}]}, &(0x7f0000000180)=0x10) [ 651.149312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.158701] Call Trace: [ 651.161338] dump_stack+0x197/0x210 [ 651.165006] should_fail.cold+0xa/0x1b [ 651.165843] audit: type=1800 audit(1576318727.135:485): pid=30732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17281 res=0 [ 651.169015] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.169038] ? percpu_ref_put_many+0x94/0x190 [ 651.169066] __should_failslab+0x121/0x190 [ 651.169081] should_failslab+0x9/0x14 [ 651.169095] kmem_cache_alloc+0x2ae/0x700 [ 651.169108] ? map_id_range_down+0x1ee/0x370 [ 651.169128] ? __put_user_ns+0x70/0x70 [ 651.222888] selinux_inode_alloc_security+0xb6/0x2a0 [ 651.228029] security_inode_alloc+0x8a/0xd0 [ 651.232385] inode_init_always+0x56e/0xb40 [ 651.236662] alloc_inode+0x81/0x190 [ 651.240326] new_inode_pseudo+0x19/0xf0 [ 651.244328] new_inode+0x1f/0x40 [ 651.247725] shmem_get_inode+0x84/0x780 10:18:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1b}]}, &(0x7f0000000180)=0x10) [ 651.251735] __shmem_file_setup.part.0+0x7e/0x2b0 [ 651.256624] shmem_file_setup+0x66/0x90 [ 651.260622] __x64_sys_memfd_create+0x2a2/0x470 [ 651.265317] ? memfd_fcntl+0x1750/0x1750 [ 651.269412] ? do_syscall_64+0x26/0x620 [ 651.273421] ? lockdep_hardirqs_on+0x415/0x5d0 [ 651.278207] ? trace_hardirqs_on+0x67/0x220 [ 651.282564] do_syscall_64+0xfd/0x620 [ 651.286397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.291790] RIP: 0033:0x45a909 10:18:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1c}]}, &(0x7f0000000180)=0x10) [ 651.295009] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.314291] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 651.322023] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a909 [ 651.329319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 651.336626] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 651.344092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6960be36d4 10:18:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x6, &(0x7f0000000000), 0x20) [ 651.351380] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:47 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000001540)) 10:18:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 651.656172] FAT-fs (loop1): bogus number of reserved sectors [ 651.687515] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:48 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) socket$inet6(0xa, 0x400000000001, 0x0) 10:18:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1d}]}, &(0x7f0000000180)=0x10) 10:18:48 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7, &(0x7f0000000000), 0x20) 10:18:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) [ 651.800275] FAULT_INJECTION: forcing a failure. [ 651.800275] name failslab, interval 1, probability 0, space 0, times 0 [ 651.860993] CPU: 0 PID: 30784 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 651.868858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.878234] Call Trace: [ 651.881894] dump_stack+0x197/0x210 [ 651.885582] should_fail.cold+0xa/0x1b [ 651.889502] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.894724] ? lock_downgrade+0x880/0x880 [ 651.898917] __should_failslab+0x121/0x190 [ 651.903176] should_failslab+0x9/0x14 [ 651.907002] kmem_cache_alloc+0x2ae/0x700 [ 651.911186] __d_alloc+0x2e/0x9c0 [ 651.914662] d_alloc_pseudo+0x1e/0x70 [ 651.918490] alloc_file_pseudo+0xe2/0x280 [ 651.922675] ? __lockdep_init_map+0x10c/0x5b0 [ 651.927204] ? alloc_file+0x4d0/0x4d0 [ 651.931031] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 651.936596] ? kasan_check_write+0x14/0x20 [ 651.940871] __shmem_file_setup.part.0+0x108/0x2b0 [ 651.945826] shmem_file_setup+0x66/0x90 [ 651.949826] __x64_sys_memfd_create+0x2a2/0x470 [ 651.954545] ? memfd_fcntl+0x1750/0x1750 [ 651.958622] ? do_syscall_64+0x26/0x620 [ 651.962618] ? lockdep_hardirqs_on+0x415/0x5d0 [ 651.967223] ? trace_hardirqs_on+0x67/0x220 [ 651.971605] do_syscall_64+0xfd/0x620 [ 651.975435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.980636] RIP: 0033:0x45a909 [ 651.983837] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 652.002940] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 10:18:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x8, &(0x7f0000000000), 0x20) 10:18:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1e}]}, &(0x7f0000000180)=0x10) 10:18:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) 10:18:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x21}]}, &(0x7f0000000180)=0x10) 10:18:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x9, &(0x7f0000000000), 0x20) [ 652.010675] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a909 [ 652.017981] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 652.025289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 652.032665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6960be36d4 [ 652.039961] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:48 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 652.287303] FAULT_INJECTION: forcing a failure. [ 652.287303] name failslab, interval 1, probability 0, space 0, times 0 [ 652.315634] CPU: 1 PID: 30811 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 652.323621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.332996] Call Trace: [ 652.335612] dump_stack+0x197/0x210 [ 652.339285] should_fail.cold+0xa/0x1b [ 652.343208] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.348344] ? lock_downgrade+0x880/0x880 [ 652.352539] __should_failslab+0x121/0x190 [ 652.356799] should_failslab+0x9/0x14 [ 652.360631] kmem_cache_alloc+0x2ae/0x700 [ 652.365024] __alloc_file+0x27/0x330 [ 652.368772] alloc_empty_file+0x72/0x170 [ 652.372872] alloc_file+0x5e/0x4d0 [ 652.376444] alloc_file_pseudo+0x189/0x280 [ 652.380716] ? alloc_file+0x4d0/0x4d0 [ 652.384546] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 652.390112] ? kasan_check_write+0x14/0x20 [ 652.394374] __shmem_file_setup.part.0+0x108/0x2b0 [ 652.399340] shmem_file_setup+0x66/0x90 [ 652.403401] __x64_sys_memfd_create+0x2a2/0x470 [ 652.408121] ? memfd_fcntl+0x1750/0x1750 [ 652.412215] ? do_syscall_64+0x26/0x620 [ 652.416212] ? lockdep_hardirqs_on+0x415/0x5d0 [ 652.420898] ? trace_hardirqs_on+0x67/0x220 [ 652.425265] do_syscall_64+0xfd/0x620 [ 652.429104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.434315] RIP: 0033:0x45a909 [ 652.437532] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 652.456472] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 652.464210] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a909 [ 652.471534] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 652.478815] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 10:18:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 652.486193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6960be36d4 [ 652.493635] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:48 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) sendfile(r11, r15, 0x0, 0x80001d00c0d0) 10:18:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000000), 0x20) 10:18:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x22}]}, &(0x7f0000000180)=0x10) 10:18:48 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 652.706893] FAULT_INJECTION: forcing a failure. [ 652.706893] name failslab, interval 1, probability 0, space 0, times 0 [ 652.725184] FAT-fs (loop1): invalid media value (0x00) 10:18:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x23}]}, &(0x7f0000000180)=0x10) [ 652.747946] FAT-fs (loop1): Can't find a valid FAT filesystem [ 652.756731] CPU: 1 PID: 30824 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 652.764593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.773985] Call Trace: [ 652.776600] dump_stack+0x197/0x210 [ 652.780259] should_fail.cold+0xa/0x1b [ 652.784177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.789313] ? lock_downgrade+0x880/0x880 [ 652.793528] __should_failslab+0x121/0x190 [ 652.797813] should_failslab+0x9/0x14 [ 652.801641] kmem_cache_alloc+0x2ae/0x700 [ 652.805831] ? rcu_read_lock_sched_held+0x110/0x130 [ 652.811072] selinux_file_alloc_security+0xb4/0x190 [ 652.816210] security_file_alloc+0x63/0xa0 [ 652.820475] __alloc_file+0xcf/0x330 [ 652.824220] alloc_empty_file+0x72/0x170 [ 652.828312] alloc_file+0x5e/0x4d0 [ 652.831975] alloc_file_pseudo+0x189/0x280 [ 652.836238] ? alloc_file+0x4d0/0x4d0 [ 652.840069] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 10:18:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x24}]}, &(0x7f0000000180)=0x10) [ 652.845755] ? kasan_check_write+0x14/0x20 [ 652.850123] __shmem_file_setup.part.0+0x108/0x2b0 [ 652.855090] shmem_file_setup+0x66/0x90 [ 652.859099] __x64_sys_memfd_create+0x2a2/0x470 [ 652.863829] ? memfd_fcntl+0x1750/0x1750 [ 652.867926] ? do_syscall_64+0x26/0x620 [ 652.871943] ? lockdep_hardirqs_on+0x415/0x5d0 [ 652.876563] ? trace_hardirqs_on+0x67/0x220 [ 652.880918] do_syscall_64+0xfd/0x620 [ 652.884755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.890051] RIP: 0033:0x45a909 [ 652.893266] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 652.912472] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 652.920379] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a909 [ 652.927670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 652.935048] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 10:18:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xc, &(0x7f0000000000), 0x20) [ 652.942343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6960be36d4 [ 652.949812] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x25}]}, &(0x7f0000000180)=0x10) 10:18:49 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:49 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 653.160743] FAULT_INJECTION: forcing a failure. [ 653.160743] name failslab, interval 1, probability 0, space 0, times 0 [ 653.199991] CPU: 1 PID: 30854 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 653.207975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.217360] Call Trace: [ 653.219984] dump_stack+0x197/0x210 [ 653.223650] should_fail.cold+0xa/0x1b [ 653.227568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 653.232791] ? lock_downgrade+0x880/0x880 [ 653.237070] __should_failslab+0x121/0x190 [ 653.241333] should_failslab+0x9/0x14 [ 653.245387] kmem_cache_alloc+0x2ae/0x700 [ 653.249563] ? notify_change+0x6d5/0xfb0 [ 653.253652] ? do_sys_ftruncate+0x41e/0x550 [ 653.257996] getname_flags+0xd6/0x5b0 [ 653.258015] getname+0x1a/0x20 [ 653.258031] do_sys_open+0x2c9/0x550 [ 653.258051] ? filp_open+0x80/0x80 [ 653.258072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.258087] ? do_syscall_64+0x26/0x620 [ 653.258104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.258118] ? do_syscall_64+0x26/0x620 [ 653.258143] __x64_sys_open+0x7e/0xc0 [ 653.258161] do_syscall_64+0xfd/0x620 [ 653.265173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.265187] RIP: 0033:0x4146a1 [ 653.265202] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 653.265209] RSP: 002b:00007f6960be2a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 653.265222] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 00000000004146a1 [ 653.265230] RDX: 00007f6960be2b0a RSI: 0000000000000002 RDI: 00007f6960be2b00 [ 653.265239] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 653.265247] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f6960be36d4 [ 653.265255] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x26}]}, &(0x7f0000000180)=0x10) 10:18:49 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xd, &(0x7f0000000000), 0x20) 10:18:49 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:49 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) r15 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r15, 0x200004) [ 653.653183] FAULT_INJECTION: forcing a failure. [ 653.653183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 653.658443] FAT-fs (loop1): invalid media value (0x00) [ 653.665167] CPU: 1 PID: 30872 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 653.665180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.665185] Call Trace: [ 653.665211] dump_stack+0x197/0x210 [ 653.665233] should_fail.cold+0xa/0x1b [ 653.665255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 653.688527] FAT-fs (loop1): Can't find a valid FAT filesystem [ 653.690497] ? debug_smp_processor_id+0x1c/0x20 [ 653.690515] ? perf_trace_lock+0xeb/0x510 [ 653.690527] ? mark_held_locks+0x100/0x100 [ 653.690545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.727693] __alloc_pages_nodemask+0x1ee/0x750 [ 653.732377] ? debug_smp_processor_id+0x1c/0x20 [ 653.737129] ? perf_trace_lock+0xeb/0x510 [ 653.741273] ? __alloc_pages_slowpath+0x2870/0x2870 [ 653.746281] ? find_held_lock+0x35/0x130 [ 653.750364] cache_grow_begin+0x91/0x8c0 [ 653.754421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 653.759962] ? check_preemption_disabled+0x48/0x290 [ 653.765668] kmem_cache_alloc+0x63b/0x700 [ 653.769814] ? notify_change+0x6d5/0xfb0 [ 653.774939] ? do_sys_ftruncate+0x41e/0x550 [ 653.779271] getname_flags+0xd6/0x5b0 [ 653.783105] getname+0x1a/0x20 [ 653.786307] do_sys_open+0x2c9/0x550 [ 653.790037] ? filp_open+0x80/0x80 [ 653.793782] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.798593] ? do_syscall_64+0x26/0x620 [ 653.802578] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.807948] ? do_syscall_64+0x26/0x620 [ 653.811921] __x64_sys_open+0x7e/0xc0 [ 653.815716] do_syscall_64+0xfd/0x620 [ 653.819554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.824779] RIP: 0033:0x4146a1 [ 653.827989] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 10:18:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x27}]}, &(0x7f0000000180)=0x10) 10:18:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x10, &(0x7f0000000000), 0x20) [ 653.847079] RSP: 002b:00007f6960be2a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 653.854886] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 00000000004146a1 [ 653.862497] RDX: 00007f6960be2b0a RSI: 0000000000000002 RDI: 00007f6960be2b00 [ 653.869910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 653.877219] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f6960be36d4 [ 653.884508] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:50 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x28}]}, &(0x7f0000000180)=0x10) [ 654.086356] ISOFS: Unable to identify CD-ROM format. 10:18:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x11, &(0x7f0000000000), 0x20) 10:18:50 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:50 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x29}]}, &(0x7f0000000180)=0x10) 10:18:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x12, &(0x7f0000000000), 0x20) [ 654.384931] FAULT_INJECTION: forcing a failure. [ 654.384931] name failslab, interval 1, probability 0, space 0, times 0 10:18:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2a}]}, &(0x7f0000000180)=0x10) 10:18:50 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x9, 0x200, 0x2, 0x9}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 654.519537] CPU: 1 PID: 30908 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 654.527417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.537413] Call Trace: [ 654.540036] dump_stack+0x197/0x210 [ 654.543701] should_fail.cold+0xa/0x1b [ 654.547755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 654.552889] ? lock_downgrade+0x880/0x880 [ 654.557079] __should_failslab+0x121/0x190 [ 654.561373] should_failslab+0x9/0x14 [ 654.565487] kmem_cache_alloc+0x2ae/0x700 [ 654.569680] ? rcu_read_lock_sched_held+0x110/0x130 [ 654.574991] selinux_file_alloc_security+0xb4/0x190 [ 654.580067] security_file_alloc+0x63/0xa0 [ 654.584346] __alloc_file+0xcf/0x330 [ 654.588176] alloc_empty_file+0x72/0x170 [ 654.592286] path_openat+0xef/0x45e0 [ 654.596207] ? __lock_acquire+0x6ee/0x49c0 [ 654.600834] ? getname+0x1a/0x20 [ 654.604211] ? do_sys_open+0x2c9/0x550 [ 654.608110] ? __x64_sys_open+0x7e/0xc0 [ 654.612099] ? do_syscall_64+0xfd/0x620 [ 654.616096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.621579] ? check_preemption_disabled+0x48/0x290 [ 654.626719] ? debug_smp_processor_id+0x1c/0x20 [ 654.631422] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 654.636726] ? __lock_is_held+0xb6/0x140 [ 654.640826] ? SOFTIRQ_verbose+0x10/0x10 [ 654.644919] ? __alloc_fd+0x44d/0x560 [ 654.648752] do_filp_open+0x1a1/0x280 [ 654.652601] ? may_open_dev+0x100/0x100 [ 654.656601] ? lock_downgrade+0x880/0x880 [ 654.661278] ? do_raw_spin_unlock+0x178/0x270 [ 654.665790] ? _raw_spin_unlock+0x2d/0x50 [ 654.669978] ? __alloc_fd+0x44d/0x560 [ 654.673797] do_sys_open+0x3fe/0x550 [ 654.677506] ? filp_open+0x80/0x80 [ 654.681161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 654.685910] ? do_syscall_64+0x26/0x620 [ 654.689875] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.695241] ? do_syscall_64+0x26/0x620 [ 654.699220] __x64_sys_open+0x7e/0xc0 [ 654.703027] do_syscall_64+0xfd/0x620 [ 654.706820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.711999] RIP: 0033:0x4146a1 [ 654.715184] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 654.734253] RSP: 002b:00007f6960be2a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 654.742050] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 00000000004146a1 [ 654.749310] RDX: 00007f6960be2b0a RSI: 0000000000000002 RDI: 00007f6960be2b00 [ 654.756677] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 654.763933] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f6960be36d4 [ 654.771199] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2b}]}, &(0x7f0000000180)=0x10) 10:18:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:51 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x13, &(0x7f0000000000), 0x20) 10:18:51 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:51 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) [ 654.901701] FAULT_INJECTION: forcing a failure. [ 654.901701] name failslab, interval 1, probability 0, space 0, times 0 [ 654.950721] FAT-fs (loop1): invalid media value (0x00) [ 654.970822] FAT-fs (loop1): Can't find a valid FAT filesystem [ 654.980994] CPU: 1 PID: 30925 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 654.988832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.998208] Call Trace: [ 655.000914] dump_stack+0x197/0x210 [ 655.004619] should_fail.cold+0xa/0x1b [ 655.008580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.013845] ? lock_downgrade+0x880/0x880 [ 655.018036] __should_failslab+0x121/0x190 [ 655.022306] should_failslab+0x9/0x14 [ 655.026126] kmem_cache_alloc+0x2ae/0x700 [ 655.030301] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.035322] selinux_file_alloc_security+0xb4/0x190 [ 655.040334] security_file_alloc+0x63/0xa0 [ 655.044579] __alloc_file+0xcf/0x330 [ 655.048297] alloc_empty_file+0x72/0x170 [ 655.052351] path_openat+0xef/0x45e0 [ 655.056063] ? __lock_acquire+0x6ee/0x49c0 [ 655.060292] ? getname+0x1a/0x20 [ 655.063670] ? do_sys_open+0x2c9/0x550 [ 655.067546] ? __x64_sys_open+0x7e/0xc0 [ 655.071532] ? do_syscall_64+0xfd/0x620 [ 655.075497] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.080884] ? check_preemption_disabled+0x48/0x290 [ 655.085900] ? debug_smp_processor_id+0x1c/0x20 [ 655.090558] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 655.095223] ? __lock_is_held+0xb6/0x140 [ 655.099375] ? SOFTIRQ_verbose+0x10/0x10 [ 655.104307] ? __alloc_fd+0x44d/0x560 [ 655.108099] do_filp_open+0x1a1/0x280 [ 655.111983] ? may_open_dev+0x100/0x100 [ 655.115951] ? lock_downgrade+0x880/0x880 [ 655.120172] ? do_raw_spin_unlock+0x178/0x270 [ 655.124743] ? _raw_spin_unlock+0x2d/0x50 [ 655.128889] ? __alloc_fd+0x44d/0x560 [ 655.132719] do_sys_open+0x3fe/0x550 [ 655.136436] ? filp_open+0x80/0x80 [ 655.139996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 655.144755] ? do_syscall_64+0x26/0x620 [ 655.148722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.154078] ? do_syscall_64+0x26/0x620 [ 655.158053] __x64_sys_open+0x7e/0xc0 [ 655.161854] do_syscall_64+0xfd/0x620 [ 655.165650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.170831] RIP: 0033:0x4146a1 [ 655.174015] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 655.192906] RSP: 002b:00007f6960be2a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 655.200605] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 00000000004146a1 [ 655.207994] RDX: 00007f6960be2b0a RSI: 0000000000000002 RDI: 00007f6960be2b00 [ 655.215289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 655.222567] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f6960be36d4 [ 655.229920] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x14, &(0x7f0000000000), 0x20) [ 655.267053] kauditd_printk_skb: 9 callbacks suppressed [ 655.267068] audit: type=1800 audit(1576318731.545:495): pid=30929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17697 res=0 10:18:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2c}]}, &(0x7f0000000180)=0x10) 10:18:51 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 655.328515] audit: type=1804 audit(1576318731.555:496): pid=30929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/890/file0/file0" dev="sda1" ino=17697 res=1 [ 655.393418] audit: type=1800 audit(1576318731.555:497): pid=30929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17697 res=0 10:18:51 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 655.478698] FAULT_INJECTION: forcing a failure. [ 655.478698] name failslab, interval 1, probability 0, space 0, times 0 [ 655.514312] CPU: 1 PID: 30951 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 655.522181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.531557] Call Trace: [ 655.534171] dump_stack+0x197/0x210 [ 655.537835] should_fail.cold+0xa/0x1b [ 655.541890] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.547021] ? lock_downgrade+0x880/0x880 [ 655.551210] __should_failslab+0x121/0x190 [ 655.555560] should_failslab+0x9/0x14 [ 655.559387] kmem_cache_alloc+0x2ae/0x700 [ 655.563563] ? __schedule+0x1495/0x1dc0 [ 655.567557] __kernfs_new_node+0xef/0x6f0 [ 655.571732] ? __schedule+0x1495/0x1dc0 [ 655.575726] ? _raw_spin_unlock_irq+0x28/0x90 [ 655.580261] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 655.585035] ? __lock_acquire+0x6ee/0x49c0 [ 655.589306] ? _raw_spin_unlock_irq+0x5e/0x90 [ 655.593816] ? __schedule+0x1495/0x1dc0 [ 655.597816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.603376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.608941] ? check_preemption_disabled+0x48/0x290 [ 655.613986] ? debug_smp_processor_id+0x1c/0x20 [ 655.618693] kernfs_new_node+0x99/0x130 [ 655.622713] kernfs_create_dir_ns+0x52/0x160 10:18:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2d}]}, &(0x7f0000000180)=0x10) [ 655.627156] internal_create_group+0x1cb/0xc30 [ 655.631763] ? bd_set_size+0x89/0xb0 [ 655.635524] ? remove_files.isra.0+0x190/0x190 [ 655.640148] sysfs_create_group+0x20/0x30 [ 655.644411] lo_ioctl+0xf8f/0x20e0 [ 655.648049] ? lo_rw_aio+0x1470/0x1470 [ 655.652053] blkdev_ioctl+0xc38/0x1ab6 [ 655.655963] ? blkpg_ioctl+0xa90/0xa90 [ 655.659855] ? find_held_lock+0x35/0x130 [ 655.663931] ? __fget+0x340/0x540 [ 655.667544] block_ioctl+0xee/0x130 [ 655.671188] ? blkdev_fallocate+0x410/0x410 [ 655.675678] do_vfs_ioctl+0xd5f/0x1380 [ 655.679574] ? selinux_file_ioctl+0x46f/0x5e0 [ 655.684084] ? selinux_file_ioctl+0x125/0x5e0 [ 655.688624] ? ioctl_preallocate+0x210/0x210 [ 655.693050] ? selinux_file_mprotect+0x620/0x620 [ 655.697912] ? iterate_fd+0x360/0x360 [ 655.701836] ? do_sys_open+0x31d/0x550 [ 655.705920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.711469] ? security_file_ioctl+0x8d/0xc0 [ 655.715902] ksys_ioctl+0xab/0xd0 [ 655.719385] __x64_sys_ioctl+0x73/0xb0 [ 655.723472] do_syscall_64+0xfd/0x620 [ 655.727305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.732502] RIP: 0033:0x45a777 [ 655.738839] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 655.757976] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 655.765769] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 10:18:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x15, &(0x7f0000000000), 0x20) [ 655.773188] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 655.780559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 655.787940] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 655.795330] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:52 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r11, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) 10:18:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 655.956499] ISOFS: Unable to identify CD-ROM format. 10:18:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2e}]}, &(0x7f0000000180)=0x10) 10:18:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x16, &(0x7f0000000000), 0x20) 10:18:52 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 656.075380] FAT-fs (loop1): invalid media value (0x00) [ 656.106807] audit: type=1800 audit(1576318732.385:498): pid=30979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17104 res=0 10:18:52 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 656.157311] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x2f}]}, &(0x7f0000000180)=0x10) [ 656.202421] audit: type=1804 audit(1576318732.385:499): pid=30979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/891/file0/file0" dev="sda1" ino=17104 res=1 [ 656.233681] audit: type=1800 audit(1576318732.385:500): pid=30979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17104 res=0 [ 656.420121] FAULT_INJECTION: forcing a failure. [ 656.420121] name failslab, interval 1, probability 0, space 0, times 0 [ 656.449993] CPU: 0 PID: 30992 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 656.457866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.467235] Call Trace: 10:18:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x17, &(0x7f0000000000), 0x20) [ 656.469849] dump_stack+0x197/0x210 [ 656.473501] should_fail.cold+0xa/0x1b [ 656.477410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 656.482558] ? lock_downgrade+0x880/0x880 [ 656.486731] __should_failslab+0x121/0x190 [ 656.490989] should_failslab+0x9/0x14 [ 656.494812] kmem_cache_alloc+0x2ae/0x700 [ 656.498973] ? __lock_acquire+0x6ee/0x49c0 [ 656.503359] __kernfs_new_node+0xef/0x6f0 [ 656.507511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.513066] ? check_preemption_disabled+0x48/0x290 [ 656.518105] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 656.522878] ? __lock_acquire+0x6ee/0x49c0 [ 656.527117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.532657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.538309] ? check_preemption_disabled+0x48/0x290 [ 656.543340] ? debug_smp_processor_id+0x1c/0x20 [ 656.548030] kernfs_new_node+0x99/0x130 [ 656.552026] kernfs_create_dir_ns+0x52/0x160 [ 656.556458] internal_create_group+0x1cb/0xc30 [ 656.561162] ? bd_set_size+0x89/0xb0 [ 656.564899] ? remove_files.isra.0+0x190/0x190 [ 656.569491] sysfs_create_group+0x20/0x30 [ 656.573662] lo_ioctl+0xf8f/0x20e0 [ 656.577207] ? lo_rw_aio+0x1470/0x1470 [ 656.581099] blkdev_ioctl+0xc38/0x1ab6 [ 656.584989] ? blkpg_ioctl+0xa90/0xa90 [ 656.588880] ? find_held_lock+0x35/0x130 [ 656.593067] ? __fget+0x340/0x540 [ 656.596542] block_ioctl+0xee/0x130 [ 656.600197] ? blkdev_fallocate+0x410/0x410 [ 656.604540] do_vfs_ioctl+0xd5f/0x1380 [ 656.608442] ? selinux_file_ioctl+0x46f/0x5e0 [ 656.613045] ? selinux_file_ioctl+0x125/0x5e0 [ 656.617553] ? ioctl_preallocate+0x210/0x210 [ 656.622091] ? selinux_file_mprotect+0x620/0x620 [ 656.626888] ? iterate_fd+0x360/0x360 [ 656.630699] ? do_sys_open+0x31d/0x550 [ 656.634617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.640239] ? security_file_ioctl+0x8d/0xc0 [ 656.644664] ksys_ioctl+0xab/0xd0 [ 656.648124] __x64_sys_ioctl+0x73/0xb0 [ 656.652020] do_syscall_64+0xfd/0x620 [ 656.655828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.661034] RIP: 0033:0x45a777 [ 656.664243] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 656.683570] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 656.691325] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 656.698609] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 656.705883] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 656.713182] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 10:18:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x30}]}, &(0x7f0000000180)=0x10) [ 656.720483] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:53 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) [ 656.874840] ISOFS: Unable to identify CD-ROM format. 10:18:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x18, &(0x7f0000000000), 0x20) 10:18:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x31}]}, &(0x7f0000000180)=0x10) 10:18:53 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 657.007381] FAT-fs (loop1): invalid media value (0x00) 10:18:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet(0x2, 0x3, 0x2) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 657.048041] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x19, &(0x7f0000000000), 0x20) 10:18:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x32}]}, &(0x7f0000000180)=0x10) [ 657.119192] audit: type=1800 audit(1576318733.395:501): pid=31011 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17080 res=0 [ 657.153348] FAULT_INJECTION: forcing a failure. [ 657.153348] name failslab, interval 1, probability 0, space 0, times 0 [ 657.165341] CPU: 0 PID: 31023 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 657.173165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.182560] Call Trace: [ 657.185174] dump_stack+0x197/0x210 [ 657.188832] should_fail.cold+0xa/0x1b [ 657.192749] ? is_bpf_text_address+0xd3/0x170 [ 657.197265] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 657.202393] ? __kernel_text_address+0xd/0x40 [ 657.206898] ? unwind_get_return_address+0x61/0xa0 [ 657.211846] __should_failslab+0x121/0x190 [ 657.216081] should_failslab+0x9/0x14 [ 657.219873] kmem_cache_alloc+0x47/0x700 [ 657.223935] ? save_stack+0xa9/0xd0 [ 657.227569] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 657.233188] idr_get_free+0x527/0xa28 [ 657.237077] idr_alloc_u32+0x1d6/0x390 [ 657.240995] ? __fprop_inc_percpu_max+0x230/0x230 [ 657.245842] ? __lock_is_held+0xb6/0x140 [ 657.249894] ? should_fail+0x14d/0x85c [ 657.253779] ? __lock_is_held+0xb6/0x140 [ 657.257847] idr_alloc_cyclic+0x132/0x270 [ 657.261989] ? idr_alloc+0x150/0x150 [ 657.266041] ? kasan_check_write+0x14/0x20 [ 657.270266] ? do_raw_spin_lock+0xc8/0x240 [ 657.276417] __kernfs_new_node+0x139/0x6f0 [ 657.280853] ? _raw_spin_unlock_irq+0x28/0x90 [ 657.285367] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 657.290132] ? __lock_acquire+0x6ee/0x49c0 [ 657.294370] ? _raw_spin_unlock_irq+0x5e/0x90 [ 657.298866] ? __schedule+0x1495/0x1dc0 [ 657.302834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.308370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.313900] ? check_preemption_disabled+0x48/0x290 [ 657.318916] ? debug_smp_processor_id+0x1c/0x20 [ 657.323579] kernfs_new_node+0x99/0x130 [ 657.327557] kernfs_create_dir_ns+0x52/0x160 [ 657.331959] internal_create_group+0x1cb/0xc30 [ 657.336531] ? bd_set_size+0x89/0xb0 [ 657.340350] ? remove_files.isra.0+0x190/0x190 [ 657.344964] sysfs_create_group+0x20/0x30 [ 657.349113] lo_ioctl+0xf8f/0x20e0 [ 657.353261] ? lo_rw_aio+0x1470/0x1470 [ 657.357231] blkdev_ioctl+0xc38/0x1ab6 [ 657.361112] ? blkpg_ioctl+0xa90/0xa90 [ 657.365776] ? find_held_lock+0x35/0x130 [ 657.369844] ? __fget+0x340/0x540 [ 657.373297] block_ioctl+0xee/0x130 [ 657.376925] ? blkdev_fallocate+0x410/0x410 [ 657.381776] do_vfs_ioctl+0xd5f/0x1380 [ 657.385673] ? selinux_file_ioctl+0x46f/0x5e0 [ 657.390239] ? selinux_file_ioctl+0x125/0x5e0 [ 657.394732] ? ioctl_preallocate+0x210/0x210 [ 657.399135] ? selinux_file_mprotect+0x620/0x620 [ 657.403979] ? iterate_fd+0x360/0x360 [ 657.407773] ? do_sys_open+0x31d/0x550 [ 657.411658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.417194] ? security_file_ioctl+0x8d/0xc0 [ 657.421686] ksys_ioctl+0xab/0xd0 [ 657.425157] __x64_sys_ioctl+0x73/0xb0 [ 657.429049] do_syscall_64+0xfd/0x620 [ 657.432947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.438166] RIP: 0033:0x45a777 [ 657.441361] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 657.460272] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 657.467989] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 657.475518] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 657.482864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 657.490132] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 657.497390] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 657.540545] audit: type=1804 audit(1576318733.425:502): pid=31011 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/892/file0/file0" dev="sda1" ino=17080 res=1 [ 657.644119] ISOFS: Unable to identify CD-ROM format. 10:18:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x1e, &(0x7f0000000000), 0x20) 10:18:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x33}]}, &(0x7f0000000180)=0x10) [ 657.672485] audit: type=1800 audit(1576318733.425:503): pid=31011 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17080 res=0 10:18:54 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:54 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 657.924644] FAULT_INJECTION: forcing a failure. [ 657.924644] name failslab, interval 1, probability 0, space 0, times 0 [ 657.936040] CPU: 1 PID: 31056 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 657.943850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.953215] Call Trace: [ 657.955827] dump_stack+0x197/0x210 [ 657.959472] should_fail.cold+0xa/0x1b [ 657.963382] ? is_bpf_text_address+0xd3/0x170 [ 657.967905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 657.973020] ? __kernel_text_address+0xd/0x40 [ 657.977515] ? unwind_get_return_address+0x61/0xa0 [ 657.982446] __should_failslab+0x121/0x190 [ 657.986674] should_failslab+0x9/0x14 [ 657.990469] kmem_cache_alloc+0x47/0x700 [ 657.994530] ? save_stack+0xa9/0xd0 [ 657.998176] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 658.003807] idr_get_free+0x527/0xa28 [ 658.007610] idr_alloc_u32+0x1d6/0x390 [ 658.011496] ? __fprop_inc_percpu_max+0x230/0x230 [ 658.016332] ? __lock_is_held+0xb6/0x140 [ 658.020382] ? should_fail+0x14d/0x85c [ 658.024268] ? __lock_is_held+0xb6/0x140 [ 658.028335] idr_alloc_cyclic+0x132/0x270 [ 658.032477] ? idr_alloc+0x150/0x150 [ 658.036192] ? kasan_check_write+0x14/0x20 [ 658.040418] ? do_raw_spin_lock+0xc8/0x240 [ 658.044651] __kernfs_new_node+0x139/0x6f0 [ 658.048888] ? lock_downgrade+0x880/0x880 [ 658.053031] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 658.057789] ? lock_downgrade+0x880/0x880 [ 658.061930] ? kasan_check_write+0x14/0x20 [ 658.066173] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 658.071286] ? wait_for_completion+0x440/0x440 [ 658.075953] kernfs_new_node+0x99/0x130 [ 658.080090] __kernfs_create_file+0x51/0x33b [ 658.084514] sysfs_add_file_mode_ns+0x222/0x560 [ 658.089210] internal_create_group+0x383/0xc30 [ 658.093807] ? bd_set_size+0x89/0xb0 [ 658.097532] ? remove_files.isra.0+0x190/0x190 [ 658.102139] sysfs_create_group+0x20/0x30 [ 658.106284] lo_ioctl+0xf8f/0x20e0 [ 658.109832] ? lo_rw_aio+0x1470/0x1470 [ 658.113716] blkdev_ioctl+0xc38/0x1ab6 [ 658.117592] ? blkpg_ioctl+0xa90/0xa90 [ 658.121471] ? find_held_lock+0x35/0x130 [ 658.125558] ? __fget+0x340/0x540 [ 658.129020] block_ioctl+0xee/0x130 [ 658.132646] ? blkdev_fallocate+0x410/0x410 [ 658.136962] do_vfs_ioctl+0xd5f/0x1380 [ 658.140844] ? selinux_file_ioctl+0x46f/0x5e0 [ 658.145333] ? selinux_file_ioctl+0x125/0x5e0 [ 658.149833] ? ioctl_preallocate+0x210/0x210 [ 658.154233] ? selinux_file_mprotect+0x620/0x620 [ 658.158988] ? iterate_fd+0x360/0x360 [ 658.162813] ? do_sys_open+0x31d/0x550 [ 658.166695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.172225] ? security_file_ioctl+0x8d/0xc0 [ 658.176637] ksys_ioctl+0xab/0xd0 [ 658.180086] __x64_sys_ioctl+0x73/0xb0 [ 658.183979] do_syscall_64+0xfd/0x620 [ 658.187787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.193043] RIP: 0033:0x45a777 [ 658.196228] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 658.215122] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.222818] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 658.230231] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 658.237539] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 658.244829] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 658.252092] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x34}]}, &(0x7f0000000180)=0x10) 10:18:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x21, &(0x7f0000000000), 0x20) 10:18:54 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) r11 = socket$inet6(0xa, 0x400000000001, 0x0) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r13 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000300)={r14, 0x874}, &(0x7f0000000340)=0x8) close(r11) [ 658.295911] audit: type=1800 audit(1576318734.575:504): pid=31063 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17111 res=0 [ 658.329775] FAT-fs (loop1): invalid media value (0x00) [ 658.348084] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x35}]}, &(0x7f0000000180)=0x10) [ 658.396969] ISOFS: Unable to identify CD-ROM format. 10:18:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x22, &(0x7f0000000000), 0x20) 10:18:54 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:54 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x36}]}, &(0x7f0000000180)=0x10) [ 658.655294] FAULT_INJECTION: forcing a failure. [ 658.655294] name failslab, interval 1, probability 0, space 0, times 0 [ 658.678111] CPU: 1 PID: 31088 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 658.686493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.695867] Call Trace: [ 658.698487] dump_stack+0x197/0x210 [ 658.702146] should_fail.cold+0xa/0x1b [ 658.706065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 658.711202] ? lock_downgrade+0x880/0x880 [ 658.715386] __should_failslab+0x121/0x190 [ 658.719651] should_failslab+0x9/0x14 [ 658.723481] kmem_cache_alloc+0x2ae/0x700 [ 658.727658] ? lock_downgrade+0x880/0x880 [ 658.731929] __kernfs_new_node+0xef/0x6f0 [ 658.736101] ? kasan_check_write+0x14/0x20 [ 658.740366] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 658.745159] ? wait_for_completion+0x440/0x440 [ 658.749775] ? mutex_unlock+0xd/0x10 [ 658.753515] ? kernfs_activate+0x192/0x1f0 [ 658.757779] kernfs_new_node+0x99/0x130 [ 658.761783] __kernfs_create_file+0x51/0x33b [ 658.766351] sysfs_add_file_mode_ns+0x222/0x560 [ 658.771067] internal_create_group+0x383/0xc30 [ 658.775677] ? bd_set_size+0x89/0xb0 [ 658.779443] ? remove_files.isra.0+0x190/0x190 [ 658.784062] sysfs_create_group+0x20/0x30 [ 658.788233] lo_ioctl+0xf8f/0x20e0 [ 658.791805] ? lo_rw_aio+0x1470/0x1470 [ 658.795723] blkdev_ioctl+0xc38/0x1ab6 [ 658.799825] ? blkpg_ioctl+0xa90/0xa90 10:18:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x23, &(0x7f0000000000), 0x20) [ 658.803813] ? find_held_lock+0x35/0x130 [ 658.807998] ? __fget+0x340/0x540 [ 658.811491] block_ioctl+0xee/0x130 [ 658.815144] ? blkdev_fallocate+0x410/0x410 [ 658.819499] do_vfs_ioctl+0xd5f/0x1380 [ 658.823417] ? selinux_file_ioctl+0x46f/0x5e0 [ 658.828986] ? selinux_file_ioctl+0x125/0x5e0 [ 658.833514] ? ioctl_preallocate+0x210/0x210 [ 658.837938] ? selinux_file_mprotect+0x620/0x620 [ 658.842716] ? iterate_fd+0x360/0x360 [ 658.846532] ? do_sys_open+0x31d/0x550 [ 658.850432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.855982] ? security_file_ioctl+0x8d/0xc0 [ 658.860400] ksys_ioctl+0xab/0xd0 [ 658.863858] __x64_sys_ioctl+0x73/0xb0 [ 658.867762] do_syscall_64+0xfd/0x620 [ 658.871769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.876977] RIP: 0033:0x45a777 [ 658.880186] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:18:55 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 658.899124] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.906850] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 658.914145] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 658.921437] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 658.928709] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 658.935989] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x37}]}, &(0x7f0000000180)=0x10) 10:18:55 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 659.117590] FAT-fs (loop1): invalid media value (0x00) [ 659.131480] ISOFS: Unable to identify CD-ROM format. [ 659.147333] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:55 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) socket$inet6(0xa, 0x400000000001, 0x0) r11 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r12 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r11, 0x84, 0x7b, &(0x7f0000000300)={r13, 0x874}, &(0x7f0000000340)=0x8) 10:18:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x38}]}, &(0x7f0000000180)=0x10) 10:18:55 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:55 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x64, &(0x7f0000000000), 0x20) 10:18:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x39}]}, &(0x7f0000000180)=0x10) [ 659.439752] FAULT_INJECTION: forcing a failure. [ 659.439752] name failslab, interval 1, probability 0, space 0, times 0 [ 659.483698] CPU: 1 PID: 31131 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 659.491572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.500964] Call Trace: [ 659.503618] dump_stack+0x197/0x210 [ 659.507379] should_fail.cold+0xa/0x1b [ 659.511313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 659.516454] ? lock_downgrade+0x880/0x880 [ 659.520645] __should_failslab+0x121/0x190 [ 659.524920] should_failslab+0x9/0x14 [ 659.528747] kmem_cache_alloc+0x2ae/0x700 10:18:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x65, &(0x7f0000000000), 0x20) 10:18:55 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 659.532940] ? lock_downgrade+0x880/0x880 [ 659.537119] __kernfs_new_node+0xef/0x6f0 [ 659.541297] ? kasan_check_write+0x14/0x20 [ 659.545564] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 659.550352] ? wait_for_completion+0x440/0x440 [ 659.555048] ? mutex_unlock+0xd/0x10 [ 659.559092] ? kernfs_activate+0x192/0x1f0 [ 659.563339] kernfs_new_node+0x99/0x130 [ 659.567321] __kernfs_create_file+0x51/0x33b [ 659.571873] sysfs_add_file_mode_ns+0x222/0x560 [ 659.576723] internal_create_group+0x383/0xc30 [ 659.581335] ? bd_set_size+0x89/0xb0 [ 659.585199] ? remove_files.isra.0+0x190/0x190 [ 659.590103] sysfs_create_group+0x20/0x30 [ 659.594476] lo_ioctl+0xf8f/0x20e0 [ 659.598286] ? lo_rw_aio+0x1470/0x1470 [ 659.602183] blkdev_ioctl+0xc38/0x1ab6 [ 659.606077] ? blkpg_ioctl+0xa90/0xa90 [ 659.610232] ? find_held_lock+0x35/0x130 [ 659.614372] ? __fget+0x340/0x540 [ 659.617841] block_ioctl+0xee/0x130 [ 659.621543] ? blkdev_fallocate+0x410/0x410 [ 659.625917] do_vfs_ioctl+0xd5f/0x1380 [ 659.629821] ? selinux_file_ioctl+0x46f/0x5e0 [ 659.634475] ? selinux_file_ioctl+0x125/0x5e0 [ 659.638990] ? ioctl_preallocate+0x210/0x210 [ 659.643429] ? selinux_file_mprotect+0x620/0x620 [ 659.648232] ? iterate_fd+0x360/0x360 [ 659.652307] ? do_sys_open+0x31d/0x550 [ 659.656216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.661800] ? security_file_ioctl+0x8d/0xc0 [ 659.666258] ksys_ioctl+0xab/0xd0 [ 659.669726] __x64_sys_ioctl+0x73/0xb0 [ 659.673644] do_syscall_64+0xfd/0x620 [ 659.678173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.683649] RIP: 0033:0x45a777 [ 659.686855] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 659.705758] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 659.713658] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 659.721047] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 659.728331] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 659.735635] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 659.742923] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 659.863303] ISOFS: Unable to identify CD-ROM format. 10:18:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:56 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3a}]}, &(0x7f0000000180)=0x10) 10:18:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x6b, &(0x7f0000000000), 0x20) [ 660.108370] FAT-fs (loop1): invalid media value (0x00) [ 660.136159] FAT-fs (loop1): Can't find a valid FAT filesystem 10:18:56 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) socket$inet6(0xa, 0x400000000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r11 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r11, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9}, &(0x7f00000002c0)=0xc) 10:18:56 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) 10:18:56 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3b}]}, &(0x7f0000000180)=0x10) 10:18:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x6e, &(0x7f0000000000), 0x20) [ 660.315345] FAULT_INJECTION: forcing a failure. [ 660.315345] name failslab, interval 1, probability 0, space 0, times 0 [ 660.335346] CPU: 1 PID: 31175 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 660.343213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.352696] Call Trace: [ 660.355316] dump_stack+0x197/0x210 [ 660.358982] should_fail.cold+0xa/0x1b 10:18:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3c}]}, &(0x7f0000000180)=0x10) [ 660.362911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 660.368050] ? lock_downgrade+0x880/0x880 [ 660.372236] __should_failslab+0x121/0x190 [ 660.376536] should_failslab+0x9/0x14 [ 660.380807] kmem_cache_alloc+0x2ae/0x700 [ 660.385871] ? lock_downgrade+0x880/0x880 [ 660.390046] __kernfs_new_node+0xef/0x6f0 [ 660.394323] ? kasan_check_write+0x14/0x20 [ 660.399293] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 660.404079] ? wait_for_completion+0x440/0x440 [ 660.408924] ? mutex_unlock+0xd/0x10 [ 660.412660] ? kernfs_activate+0x192/0x1f0 [ 660.417290] kernfs_new_node+0x99/0x130 [ 660.421314] __kernfs_create_file+0x51/0x33b [ 660.426102] sysfs_add_file_mode_ns+0x222/0x560 [ 660.430885] internal_create_group+0x383/0xc30 [ 660.435515] ? bd_set_size+0x89/0xb0 [ 660.439267] ? remove_files.isra.0+0x190/0x190 [ 660.444104] sysfs_create_group+0x20/0x30 [ 660.448291] lo_ioctl+0xf8f/0x20e0 [ 660.451864] ? lo_rw_aio+0x1470/0x1470 [ 660.455766] blkdev_ioctl+0xc38/0x1ab6 [ 660.459722] ? blkpg_ioctl+0xa90/0xa90 [ 660.463727] ? find_held_lock+0x35/0x130 [ 660.467817] ? __fget+0x340/0x540 [ 660.471390] block_ioctl+0xee/0x130 [ 660.475148] ? blkdev_fallocate+0x410/0x410 [ 660.479517] do_vfs_ioctl+0xd5f/0x1380 [ 660.483412] ? selinux_file_ioctl+0x46f/0x5e0 [ 660.487916] ? selinux_file_ioctl+0x125/0x5e0 [ 660.492432] ? ioctl_preallocate+0x210/0x210 [ 660.497387] ? selinux_file_mprotect+0x620/0x620 [ 660.502199] ? iterate_fd+0x360/0x360 [ 660.506040] ? do_sys_open+0x31d/0x550 [ 660.509957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.515612] ? security_file_ioctl+0x8d/0xc0 [ 660.520036] ksys_ioctl+0xab/0xd0 [ 660.523626] __x64_sys_ioctl+0x73/0xb0 [ 660.527538] do_syscall_64+0xfd/0x620 [ 660.531350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.536542] RIP: 0033:0x45a777 [ 660.539785] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:18:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x71, &(0x7f0000000000), 0x20) 10:18:56 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) [ 660.559284] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 660.567007] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 660.574536] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 660.581825] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 660.589119] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 660.596408] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 660.740533] ISOFS: Unable to identify CD-ROM format. 10:18:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:18:57 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)) 10:18:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3d}]}, &(0x7f0000000180)=0x10) 10:18:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x72, &(0x7f0000000000), 0x20) [ 660.990534] FAT-fs (loop1): invalid media value (0x00) [ 661.007523] FAT-fs (loop1): Can't find a valid FAT filesystem [ 661.065456] kauditd_printk_skb: 8 callbacks suppressed [ 661.065470] audit: type=1800 audit(1576318737.345:513): pid=31217 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16641 res=0 [ 661.099273] audit: type=1804 audit(1576318737.345:514): pid=31217 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/896/file0/file0" dev="sda1" ino=16641 res=1 [ 661.130265] audit: type=1800 audit(1576318737.345:515): pid=31217 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16641 res=0 10:18:57 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) socket$inet6(0xa, 0x400000000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) r11 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, 0x0, &(0x7f0000000300)) 10:18:57 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)) 10:18:57 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3e}]}, &(0x7f0000000180)=0x10) 10:18:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x75, &(0x7f0000000000), 0x20) [ 661.471773] FAULT_INJECTION: forcing a failure. [ 661.471773] name failslab, interval 1, probability 0, space 0, times 0 [ 661.497439] CPU: 0 PID: 31227 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 661.505316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.514791] Call Trace: [ 661.517408] dump_stack+0x197/0x210 10:18:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x76, &(0x7f0000000000), 0x20) 10:18:57 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)) 10:18:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x41}]}, &(0x7f0000000180)=0x10) [ 661.521069] should_fail.cold+0xa/0x1b [ 661.524979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.530105] ? lock_downgrade+0x880/0x880 [ 661.534288] __should_failslab+0x121/0x190 [ 661.538533] should_failslab+0x9/0x14 [ 661.542363] kmem_cache_alloc+0x2ae/0x700 [ 661.546515] ? lock_downgrade+0x880/0x880 [ 661.550670] __kernfs_new_node+0xef/0x6f0 [ 661.554826] ? kasan_check_write+0x14/0x20 [ 661.559076] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 661.563865] ? wait_for_completion+0x440/0x440 [ 661.568457] ? mutex_unlock+0xd/0x10 [ 661.572211] ? kernfs_activate+0x192/0x1f0 [ 661.576483] kernfs_new_node+0x99/0x130 [ 661.580476] __kernfs_create_file+0x51/0x33b [ 661.584953] sysfs_add_file_mode_ns+0x222/0x560 [ 661.589634] internal_create_group+0x383/0xc30 [ 661.594213] ? bd_set_size+0x89/0xb0 [ 661.597943] ? remove_files.isra.0+0x190/0x190 [ 661.602526] sysfs_create_group+0x20/0x30 [ 661.606731] lo_ioctl+0xf8f/0x20e0 [ 661.610286] ? lo_rw_aio+0x1470/0x1470 [ 661.614189] blkdev_ioctl+0xc38/0x1ab6 [ 661.618074] ? blkpg_ioctl+0xa90/0xa90 [ 661.622000] ? find_held_lock+0x35/0x130 [ 661.626075] ? __fget+0x340/0x540 [ 661.629555] block_ioctl+0xee/0x130 [ 661.633173] ? blkdev_fallocate+0x410/0x410 [ 661.637523] do_vfs_ioctl+0xd5f/0x1380 [ 661.641414] ? selinux_file_ioctl+0x46f/0x5e0 [ 661.645920] ? selinux_file_ioctl+0x125/0x5e0 [ 661.650432] ? ioctl_preallocate+0x210/0x210 [ 661.654862] ? selinux_file_mprotect+0x620/0x620 [ 661.659643] ? iterate_fd+0x360/0x360 [ 661.663460] ? do_sys_open+0x31d/0x550 [ 661.667388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.673059] ? security_file_ioctl+0x8d/0xc0 [ 661.677492] ksys_ioctl+0xab/0xd0 [ 661.680954] __x64_sys_ioctl+0x73/0xb0 [ 661.684864] do_syscall_64+0xfd/0x620 [ 661.688692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.693889] RIP: 0033:0x45a777 [ 661.697086] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:18:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 661.716030] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 661.723741] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 661.731005] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 661.738265] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 661.745535] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 661.752811] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x77, &(0x7f0000000000), 0x20) [ 661.895653] ISOFS: Unable to identify CD-ROM format. 10:18:58 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) 10:18:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x40000}]}, &(0x7f0000000180)=0x10) [ 661.958295] audit: type=1800 audit(1576318738.235:516): pid=31251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16517 res=0 [ 661.981772] audit: type=1804 audit(1576318738.235:517): pid=31251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/897/file0/file0" dev="sda1" ino=16517 res=1 [ 662.009700] audit: type=1800 audit(1576318738.235:518): pid=31251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16517 res=0 10:18:58 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) socket$inet6(0xa, 0x400000000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) open(0x0, 0x0, 0x0) 10:18:58 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:18:58 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000480)={0x0, 0x0, {0x2, 0x0, 0x1}}) 10:18:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x3) 10:18:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x78, &(0x7f0000000000), 0x20) [ 662.383233] FAULT_INJECTION: forcing a failure. [ 662.383233] name failslab, interval 1, probability 0, space 0, times 0 [ 662.403656] CPU: 1 PID: 31274 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 662.411536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.420914] Call Trace: [ 662.423568] dump_stack+0x197/0x210 [ 662.427399] should_fail.cold+0xa/0x1b 10:18:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0xe000000) 10:18:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0xf) [ 662.431326] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 662.436452] ? lock_downgrade+0x880/0x880 [ 662.440635] __should_failslab+0x121/0x190 [ 662.444904] should_failslab+0x9/0x14 [ 662.449776] __kmalloc+0x2e2/0x750 [ 662.453345] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.458410] ? kobject_get_path+0xc4/0x1b0 [ 662.462688] kobject_get_path+0xc4/0x1b0 [ 662.466936] kobject_uevent_env+0x3ab/0x101f [ 662.471372] kobject_uevent+0x20/0x26 [ 662.475192] lo_ioctl+0x100b/0x20e0 [ 662.478904] ? lo_rw_aio+0x1470/0x1470 [ 662.482990] blkdev_ioctl+0xc38/0x1ab6 [ 662.486886] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 662.491761] ? blkpg_ioctl+0xa90/0xa90 [ 662.495664] ? retint_kernel+0x2d/0x2d [ 662.499562] ? trace_hardirqs_on_caller+0x6a/0x220 [ 662.504534] block_ioctl+0xee/0x130 [ 662.508187] ? blkdev_fallocate+0x410/0x410 [ 662.512537] do_vfs_ioctl+0xd5f/0x1380 [ 662.516534] ? selinux_file_ioctl+0x46f/0x5e0 [ 662.521054] ? selinux_file_ioctl+0x125/0x5e0 [ 662.525659] ? ioctl_preallocate+0x210/0x210 [ 662.530080] ? selinux_file_mprotect+0x620/0x620 [ 662.534859] ? iterate_fd+0x360/0x360 [ 662.538701] ? do_sys_open+0x31d/0x550 [ 662.542614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.548167] ? security_file_ioctl+0x8d/0xc0 [ 662.552899] ksys_ioctl+0xab/0xd0 [ 662.556372] __x64_sys_ioctl+0x73/0xb0 [ 662.560276] do_syscall_64+0xfd/0x620 [ 662.564103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.569388] RIP: 0033:0x45a777 [ 662.572632] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.591737] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.599639] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 662.606945] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 662.614237] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 662.621533] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 10:18:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x79, &(0x7f0000000000), 0x20) [ 662.628831] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:18:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 662.737391] ISOFS: Unable to identify CD-ROM format. 10:18:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x14) 10:18:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7b, &(0x7f0000000000), 0x20) 10:18:59 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 662.928903] audit: type=1800 audit(1576318739.185:519): pid=31299 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=28 res=0 [ 663.003036] audit: type=1804 audit(1576318739.235:520): pid=31299 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/898/file0/file0" dev="loop1" ino=28 res=1 [ 663.064043] FAULT_INJECTION: forcing a failure. [ 663.064043] name failslab, interval 1, probability 0, space 0, times 0 [ 663.091377] CPU: 1 PID: 31307 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 663.099255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.108632] Call Trace: [ 663.111246] dump_stack+0x197/0x210 [ 663.114902] should_fail.cold+0xa/0x1b [ 663.118820] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.123971] ? lock_downgrade+0x880/0x880 [ 663.128147] __should_failslab+0x121/0x190 [ 663.132399] should_failslab+0x9/0x14 [ 663.136213] __kmalloc+0x2e2/0x750 [ 663.139771] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.144804] ? kobject_get_path+0xc4/0x1b0 [ 663.149057] kobject_get_path+0xc4/0x1b0 [ 663.153134] kobject_uevent_env+0x3ab/0x101f [ 663.157659] kobject_uevent+0x20/0x26 [ 663.161491] lo_ioctl+0x100b/0x20e0 [ 663.165137] ? lo_rw_aio+0x1470/0x1470 [ 663.169296] blkdev_ioctl+0xc38/0x1ab6 [ 663.173216] ? blkpg_ioctl+0xa90/0xa90 [ 663.177115] ? find_held_lock+0x35/0x130 [ 663.181723] ? __fget+0x340/0x540 [ 663.185210] block_ioctl+0xee/0x130 [ 663.189104] ? blkdev_fallocate+0x410/0x410 [ 663.193441] do_vfs_ioctl+0xd5f/0x1380 [ 663.197363] ? selinux_file_ioctl+0x46f/0x5e0 [ 663.202226] ? selinux_file_ioctl+0x125/0x5e0 [ 663.206739] ? ioctl_preallocate+0x210/0x210 [ 663.211168] ? selinux_file_mprotect+0x620/0x620 [ 663.215944] ? iterate_fd+0x360/0x360 [ 663.219760] ? do_sys_open+0x31d/0x550 [ 663.223704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.229257] ? security_file_ioctl+0x8d/0xc0 [ 663.233690] ksys_ioctl+0xab/0xd0 [ 663.237159] __x64_sys_ioctl+0x73/0xb0 [ 663.241063] do_syscall_64+0xfd/0x620 [ 663.244905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.250109] RIP: 0033:0x45a777 [ 663.253322] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.272332] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.280058] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 663.287345] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 663.294663] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 663.301962] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 10:18:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x20000150) 10:18:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7c, &(0x7f0000000000), 0x20) 10:18:59 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) socket$inet6(0xa, 0x400000000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) [ 663.309252] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 663.321396] audit: type=1800 audit(1576318739.235:521): pid=31299 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=28 res=0 [ 663.416458] ISOFS: Unable to identify CD-ROM format. 10:18:59 executing program 5: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:18:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7d, &(0x7f0000000000), 0x20) 10:18:59 executing program 2: open(0x0, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) stat(0x0, &(0x7f00000002c0)) setresuid(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x389}}], 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0xc1328430ba889503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/anycast6\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) 10:18:59 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:00 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 10:19:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20000020) 10:19:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x800, 0x84) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r3, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 663.777961] FAULT_INJECTION: forcing a failure. [ 663.777961] name failslab, interval 1, probability 0, space 0, times 0 [ 663.796252] CPU: 1 PID: 31339 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 663.804118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.813495] Call Trace: [ 663.816110] dump_stack+0x197/0x210 [ 663.819774] should_fail.cold+0xa/0x1b 10:19:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{&(0x7f0000000340)=@pppoe, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000240)=""/41, 0x29}, {&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000001fc0)=""/17, 0x11}, {&(0x7f00000005c0)=""/38, 0x26}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/202, 0xca}, {&(0x7f0000000800)=""/232, 0xe8}, {&(0x7f0000000900)=""/35, 0x23}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/229, 0xe5}], 0xa}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001b80)=""/26, 0x1a}, {&(0x7f0000001bc0)=""/55, 0x37}, {&(0x7f0000001c00)=""/75, 0x4b}, {&(0x7f0000001c80)=""/217, 0xd9}, {&(0x7f0000001d80)=""/197, 0xc5}, {&(0x7f0000001e80)=""/7, 0x7}], 0x6, &(0x7f0000001f40)=""/39, 0x27}, 0x6}, {{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000002480)=""/196, 0xc4}], 0x1}, 0x6}, {{&(0x7f00000020c0)=@nl=@unspec, 0x80, &(0x7f0000002340)=[{0x0}, {&(0x7f0000002180)=""/100, 0x64}, {&(0x7f0000002200)=""/39, 0x27}, {0x0}], 0x4}, 0x7213}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0xe04394f8338058ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getuid() socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000002c0)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000580)) lstat(&(0x7f00000000c0)='.\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) [ 663.823795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.828932] ? lock_downgrade+0x880/0x880 [ 663.833141] __should_failslab+0x121/0x190 [ 663.837414] should_failslab+0x9/0x14 [ 663.841238] kmem_cache_alloc_node_trace+0x274/0x720 [ 663.846362] ? __alloc_skb+0xd5/0x5f0 [ 663.850204] __kmalloc_node_track_caller+0x3d/0x80 [ 663.855164] __kmalloc_reserve.isra.0+0x40/0xf0 [ 663.859862] __alloc_skb+0x10b/0x5f0 [ 663.863605] ? skb_trim+0x190/0x190 [ 663.867282] ? kasan_check_read+0x11/0x20 [ 663.871447] alloc_uevent_skb+0x83/0x1e2 [ 663.875516] kobject_uevent_env+0xaa3/0x101f [ 663.879961] kobject_uevent+0x20/0x26 [ 663.883880] lo_ioctl+0x100b/0x20e0 [ 663.887761] ? lo_rw_aio+0x1470/0x1470 [ 663.891661] blkdev_ioctl+0xc38/0x1ab6 [ 663.895592] ? blkpg_ioctl+0xa90/0xa90 [ 663.899495] ? find_held_lock+0x35/0x130 [ 663.903593] ? __fget+0x340/0x540 [ 663.907064] block_ioctl+0xee/0x130 [ 663.910695] ? blkdev_fallocate+0x410/0x410 [ 663.915009] do_vfs_ioctl+0xd5f/0x1380 [ 663.918910] ? selinux_file_ioctl+0x46f/0x5e0 [ 663.923400] ? selinux_file_ioctl+0x125/0x5e0 [ 663.927911] ? ioctl_preallocate+0x210/0x210 [ 663.932333] ? selinux_file_mprotect+0x620/0x620 [ 663.937110] ? iterate_fd+0x360/0x360 [ 663.941629] ? do_sys_open+0x31d/0x550 [ 663.945568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.951140] ? security_file_ioctl+0x8d/0xc0 [ 663.955581] ksys_ioctl+0xab/0xd0 [ 663.959146] __x64_sys_ioctl+0x73/0xb0 [ 663.963074] do_syscall_64+0xfd/0x620 [ 663.967115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.972436] RIP: 0033:0x45a777 [ 663.975665] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.995056] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 664.002793] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 664.010089] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 664.017373] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 664.024653] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 664.031970] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 664.077081] ISOFS: Unable to identify CD-ROM format. 10:19:00 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) socket$inet6(0xa, 0x400000000001, 0x0) 10:19:00 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0xa5) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 10:19:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000140)={r7, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}}, 0x2, 0x1, 0x101, 0x7, 0xc}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={r8, 0x1c, &(0x7f0000000240)=[@in={0x2, 0x4e24, @loopback}]}, &(0x7f0000000600)=0xfffffffffffffcde) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r9, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000000c0)={r9, @in={{0x2, 0x4e20, @multicast2}}, [0x7f, 0x7, 0xa0, 0xffffffff, 0x1, 0xede, 0x2, 0x3a, 0x10001, 0x6, 0xd6, 0x1f, 0xfffffffeffffffff, 0x1f, 0x7]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r10, 0x9, 0x5}, &(0x7f0000000200)=0x8) [ 664.476885] FAULT_INJECTION: forcing a failure. [ 664.476885] name failslab, interval 1, probability 0, space 0, times 0 [ 664.531419] CPU: 1 PID: 31380 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 664.539300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.548675] Call Trace: [ 664.551545] dump_stack+0x197/0x210 [ 664.555313] should_fail.cold+0xa/0x1b [ 664.559247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 664.564664] ? lock_downgrade+0x880/0x880 [ 664.568857] __should_failslab+0x121/0x190 [ 664.573131] should_failslab+0x9/0x14 [ 664.577120] kmem_cache_alloc_node+0x26c/0x710 [ 664.581909] ? find_held_lock+0x35/0x130 [ 664.586013] __alloc_skb+0xd5/0x5f0 [ 664.589859] ? skb_trim+0x190/0x190 [ 664.593610] ? kasan_check_read+0x11/0x20 [ 664.597811] alloc_uevent_skb+0x83/0x1e2 [ 664.602163] kobject_uevent_env+0xaa3/0x101f [ 664.606608] kobject_uevent+0x20/0x26 [ 664.610444] lo_ioctl+0x100b/0x20e0 [ 664.614101] ? lo_rw_aio+0x1470/0x1470 [ 664.618045] blkdev_ioctl+0xc38/0x1ab6 [ 664.621965] ? blkpg_ioctl+0xa90/0xa90 [ 664.625876] ? find_held_lock+0x35/0x130 [ 664.630543] ? __fget+0x340/0x540 [ 664.634058] block_ioctl+0xee/0x130 [ 664.637715] ? blkdev_fallocate+0x410/0x410 [ 664.642084] do_vfs_ioctl+0xd5f/0x1380 [ 664.646017] ? selinux_file_ioctl+0x46f/0x5e0 [ 664.651056] ? selinux_file_ioctl+0x125/0x5e0 [ 664.655585] ? ioctl_preallocate+0x210/0x210 [ 664.660220] ? selinux_file_mprotect+0x620/0x620 [ 664.665012] ? iterate_fd+0x360/0x360 [ 664.669080] ? do_sys_open+0x31d/0x550 [ 664.673111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.678779] ? security_file_ioctl+0x8d/0xc0 [ 664.683433] ksys_ioctl+0xab/0xd0 [ 664.687332] __x64_sys_ioctl+0x73/0xb0 [ 664.691438] do_syscall_64+0xfd/0x620 [ 664.695454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.700858] RIP: 0033:0x45a777 [ 664.704101] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 664.724436] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 664.732494] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 664.740094] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 664.747399] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 664.754872] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 664.763045] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 664.823411] audit: type=1800 audit(1576318741.105:522): pid=31354 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16539 res=0 [ 664.891111] ISOFS: Unable to identify CD-ROM format. 10:19:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x3, 0x8, [0x7, 0x3, 0x2, 0x0, 0x0, 0x9, 0x1, 0x8f71]}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x1, 0x2, 0x3, 0xffffffff, 0x0, 0x1, 0x3, 0x6, r3}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:01 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) 10:19:01 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x2, 0x1, 0x1, 0x2, 0x520, 0xad63}, 0x20) [ 665.336491] FAULT_INJECTION: forcing a failure. [ 665.336491] name failslab, interval 1, probability 0, space 0, times 0 [ 665.352442] CPU: 0 PID: 31412 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 665.360567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.370594] Call Trace: [ 665.373209] dump_stack+0x197/0x210 [ 665.376875] should_fail.cold+0xa/0x1b [ 665.380876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 665.386431] ? lock_downgrade+0x880/0x880 [ 665.390604] __should_failslab+0x121/0x190 [ 665.395383] should_failslab+0x9/0x14 [ 665.399212] kmem_cache_alloc+0x2ae/0x700 [ 665.403391] getname_flags+0xd6/0x5b0 [ 665.407291] do_mkdirat+0xa0/0x2a0 [ 665.411551] ? __ia32_sys_mknod+0xb0/0xb0 [ 665.415818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 665.420596] ? do_syscall_64+0x26/0x620 [ 665.424607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.429993] ? do_syscall_64+0x26/0x620 [ 665.433994] ? lockdep_hardirqs_on+0x415/0x5d0 [ 665.438609] __x64_sys_mkdir+0x5c/0x80 [ 665.442523] do_syscall_64+0xfd/0x620 [ 665.446343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.451543] RIP: 0033:0x459d27 [ 665.454753] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.473806] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 10:19:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0xa5) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) [ 665.481522] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 665.481531] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 665.481538] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 665.481546] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 665.481553] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) r4 = accept4$x25(r3, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) close(r2) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x8018, 0x8, 0x8, r6}, &(0x7f00000000c0)=0x10) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:02 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0xb2, 0x0, 0x6, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_lifetime={0x4, 0x4, 0x5, 0x9, 0x3, 0x6}]}, 0x30}}, 0x24000041) 10:19:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 665.843071] FAULT_INJECTION: forcing a failure. [ 665.843071] name failslab, interval 1, probability 0, space 0, times 0 [ 665.886274] CPU: 1 PID: 31436 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 665.894409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.903782] Call Trace: [ 665.906393] dump_stack+0x197/0x210 [ 665.910055] should_fail.cold+0xa/0x1b [ 665.913977] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 665.919201] ? lock_downgrade+0x880/0x880 [ 665.923562] __should_failslab+0x121/0x190 [ 665.927827] should_failslab+0x9/0x14 [ 665.931654] kmem_cache_alloc+0x2ae/0x700 [ 665.935832] ? lock_downgrade+0x880/0x880 [ 665.940011] skb_clone+0x156/0x3e0 [ 665.943587] netlink_broadcast_filtered+0x875/0xb30 [ 665.948679] netlink_broadcast+0x3a/0x50 [ 665.952768] kobject_uevent_env+0xad6/0x101f [ 665.957212] kobject_uevent+0x20/0x26 [ 665.961491] lo_ioctl+0x100b/0x20e0 [ 665.965863] ? lo_rw_aio+0x1470/0x1470 [ 665.969776] blkdev_ioctl+0xc38/0x1ab6 [ 665.973681] ? blkpg_ioctl+0xa90/0xa90 [ 665.977613] ? find_held_lock+0x35/0x130 [ 665.981730] ? __fget+0x340/0x540 [ 665.985218] block_ioctl+0xee/0x130 [ 665.988866] ? blkdev_fallocate+0x410/0x410 [ 665.993209] do_vfs_ioctl+0xd5f/0x1380 [ 665.997113] ? selinux_file_ioctl+0x46f/0x5e0 [ 666.001626] ? selinux_file_ioctl+0x125/0x5e0 [ 666.006136] ? ioctl_preallocate+0x210/0x210 [ 666.010564] ? selinux_file_mprotect+0x620/0x620 [ 666.015395] ? iterate_fd+0x360/0x360 [ 666.019224] ? do_sys_open+0x31d/0x550 [ 666.023228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.028813] ? security_file_ioctl+0x8d/0xc0 [ 666.033342] ksys_ioctl+0xab/0xd0 [ 666.036878] __x64_sys_ioctl+0x73/0xb0 [ 666.040972] do_syscall_64+0xfd/0x620 [ 666.044809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.050025] RIP: 0033:0x45a777 [ 666.053240] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 666.072250] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 666.080089] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045a777 [ 666.087381] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 666.094672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 666.102746] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 666.110045] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:02 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) [ 666.299431] ISOFS: Unable to identify CD-ROM format. 10:19:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 10:19:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) 10:19:02 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='self[usercpusetem1\x00', 0x1, 0x30, &(0x7f0000000040)={0x2, 0x9, 0x7123, 0x8, 0x5, 0x3ff, 0xbc, 0x100}) 10:19:02 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x12fb, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xc0000) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x2a}, 0x401}, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000400)='./file0\x00', 0x911af2c56e26678d) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000340)='unconfined_u:system_r:insm\x92d_t:s0-s0:c0.c1023\x00\x86X7~\x94\xe1\r\xb3\xf0-\xebM\x9b\xba1\xa1B\xd73\xfd4\xd7\b\xe5Z\xa1\xe6\x87\xc3\x8dY\xf6\x8c\xebwZ`\x9ec_\xf6\x98\x05\xdb\xaf6\x0f\xb0\xfe\xbb\n\xe2\'\xdd\xad=\x97\xe5\x8a\xa0g\xa8gF\xc2\x9e\xbc{\x84\xb1\v\xe1\xbd\xaeg\x88#L\x8c\xf5OL\x82lS\xed', 0x84, 0x0) r3 = socket(0x10, 0x2, 0x0) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) 10:19:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @mcast2, 0xfffffffd}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f00000000c0)=""/159, &(0x7f0000000040)=0x9f) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 666.656082] FAULT_INJECTION: forcing a failure. [ 666.656082] name failslab, interval 1, probability 0, space 0, times 0 [ 666.711260] CPU: 0 PID: 31457 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 666.719389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.728770] Call Trace: [ 666.731389] dump_stack+0x197/0x210 [ 666.735038] should_fail.cold+0xa/0x1b [ 666.738956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 666.744297] ? lock_downgrade+0x880/0x880 [ 666.748629] __should_failslab+0x121/0x190 [ 666.748650] should_failslab+0x9/0x14 [ 666.748664] kmem_cache_alloc+0x2ae/0x700 [ 666.748686] getname_flags+0xd6/0x5b0 [ 666.765278] do_mkdirat+0xa0/0x2a0 [ 666.768867] ? __ia32_sys_mknod+0xb0/0xb0 [ 666.768885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 666.768904] ? do_syscall_64+0x26/0x620 [ 666.781846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.787236] ? do_syscall_64+0x26/0x620 [ 666.791244] ? lockdep_hardirqs_on+0x415/0x5d0 [ 666.795886] __x64_sys_mkdir+0x5c/0x80 [ 666.799805] do_syscall_64+0xfd/0x620 [ 666.803658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.808874] RIP: 0033:0x459d27 [ 666.812172] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 666.831105] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 666.838844] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 666.846295] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 666.853590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 10:19:03 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x18300, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000040)=0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) [ 666.860943] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 666.868236] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:03 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) [ 667.094239] FAULT_INJECTION: forcing a failure. [ 667.094239] name failslab, interval 1, probability 0, space 0, times 0 [ 667.137052] CPU: 0 PID: 31479 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 667.144956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.145006] Call Trace: [ 667.145030] dump_stack+0x197/0x210 [ 667.145052] should_fail.cold+0xa/0x1b [ 667.164669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 667.169840] __should_failslab+0x121/0x190 [ 667.174116] should_failslab+0x9/0x14 [ 667.177927] kmem_cache_alloc+0x2ae/0x700 [ 667.182270] ? SOFTIRQ_verbose+0x10/0x10 [ 667.182287] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.182308] ? ratelimit_state_init+0xb0/0xb0 [ 667.182324] ext4_alloc_inode+0x1f/0x630 [ 667.182336] ? ratelimit_state_init+0xb0/0xb0 [ 667.182347] alloc_inode+0x64/0x190 [ 667.182362] new_inode_pseudo+0x19/0xf0 [ 667.182376] new_inode+0x1f/0x40 [ 667.182389] __ext4_new_inode+0x3cb/0x52d0 [ 667.182405] ? kasan_check_read+0x11/0x20 [ 667.182425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.182443] ? ext4_free_inode+0x1470/0x1470 [ 667.182465] ? dquot_get_next_dqblk+0x180/0x180 [ 667.238771] ? selinux_determine_inode_label+0x1b1/0x360 [ 667.244254] ext4_mkdir+0x3d5/0xdf0 [ 667.247909] ? ext4_init_dot_dotdot+0x520/0x520 [ 667.252687] ? selinux_inode_mkdir+0x23/0x30 [ 667.257122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.262764] ? security_inode_mkdir+0xe4/0x120 [ 667.267373] vfs_mkdir+0x42e/0x690 [ 667.270929] do_mkdirat+0x234/0x2a0 [ 667.274828] ? __ia32_sys_mknod+0xb0/0xb0 [ 667.278984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 667.283844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.289229] ? do_syscall_64+0x26/0x620 [ 667.293228] ? lockdep_hardirqs_on+0x415/0x5d0 [ 667.298348] __x64_sys_mkdir+0x5c/0x80 [ 667.302253] do_syscall_64+0xfd/0x620 [ 667.306074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.311270] RIP: 0033:0x459d27 [ 667.314512] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:19:03 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) ftruncate(r2, 0x200004) 10:19:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:03 executing program 4: r0 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000000c0)=""/206) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x5, 0x0, 0x200, 0xfffffffc, 0x3, 0x3}, 0x20) [ 667.333692] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 667.341418] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 667.348695] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 667.356242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 667.363543] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 667.370820] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x774, 0x3, 0x6, 0x8001, 0xfffffff8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x800000, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x940ba267353d1bc7, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 10:19:04 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x12fb, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xc0000) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x2a}, 0x401}, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000400)='./file0\x00', 0x911af2c56e26678d) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000340)='unconfined_u:system_r:insm\x92d_t:s0-s0:c0.c1023\x00\x86X7~\x94\xe1\r\xb3\xf0-\xebM\x9b\xba1\xa1B\xd73\xfd4\xd7\b\xe5Z\xa1\xe6\x87\xc3\x8dY\xf6\x8c\xebwZ`\x9ec_\xf6\x98\x05\xdb\xaf6\x0f\xb0\xfe\xbb\n\xe2\'\xdd\xad=\x97\xe5\x8a\xa0g\xa8gF\xc2\x9e\xbc{\x84\xb1\v\xe1\xbd\xaeg\x88#L\x8c\xf5OL\x82lS\xed', 0x84, 0x0) r3 = socket(0x10, 0x2, 0x0) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) 10:19:04 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x2e0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x8, 0x4) sendto$inet6(r2, &(0x7f00000000c0)="74c9f1b2b259a198bb6ef7d2ceaad423212f6580759d2fdca6b3a8dde9cb2f833e82ac23ef8473804e5c6659f8cdd6bc3a7ab2863c52c1b684cc4233a489aebd4d290c701a83192d18adcd3f112755c719285dd269e1abd3aa75f8d1140cda3ffb45d5b9e64a7bcc578fa3976e5c616d29", 0x71, 0x4, &(0x7f0000000040)={0xa, 0x4e22, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xd6}, 0x1c) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 667.893466] FAULT_INJECTION: forcing a failure. [ 667.893466] name failslab, interval 1, probability 0, space 0, times 0 [ 667.933705] CPU: 0 PID: 31512 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 667.941570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.950944] Call Trace: [ 667.953555] dump_stack+0x197/0x210 [ 667.957200] should_fail.cold+0xa/0x1b [ 667.961101] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 667.966407] __should_failslab+0x121/0x190 [ 667.970655] should_failslab+0x9/0x14 [ 667.974460] kmem_cache_alloc+0x2ae/0x700 [ 667.978606] ? SOFTIRQ_verbose+0x10/0x10 [ 667.982683] ? rcu_read_lock_sched_held+0x110/0x130 [ 667.987708] ? ratelimit_state_init+0xb0/0xb0 [ 667.992198] ext4_alloc_inode+0x1f/0x630 [ 667.996248] ? ratelimit_state_init+0xb0/0xb0 [ 668.000744] alloc_inode+0x64/0x190 [ 668.004390] new_inode_pseudo+0x19/0xf0 [ 668.008372] new_inode+0x1f/0x40 [ 668.011758] __ext4_new_inode+0x3cb/0x52d0 [ 668.016037] ? kasan_check_read+0x11/0x20 [ 668.020276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.027299] ? ext4_free_inode+0x1470/0x1470 [ 668.031712] ? dquot_get_next_dqblk+0x180/0x180 [ 668.036402] ? selinux_determine_inode_label+0x1b1/0x360 [ 668.041854] ext4_mkdir+0x3d5/0xdf0 [ 668.045495] ? ext4_init_dot_dotdot+0x520/0x520 [ 668.050683] ? selinux_inode_mkdir+0x23/0x30 [ 668.055108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.060835] ? security_inode_mkdir+0xe4/0x120 [ 668.065777] vfs_mkdir+0x42e/0x690 [ 668.069317] do_mkdirat+0x234/0x2a0 [ 668.073233] ? __ia32_sys_mknod+0xb0/0xb0 [ 668.077375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.082128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.087751] ? do_syscall_64+0x26/0x620 [ 668.091745] ? lockdep_hardirqs_on+0x415/0x5d0 [ 668.096325] __x64_sys_mkdir+0x5c/0x80 [ 668.100221] do_syscall_64+0xfd/0x620 [ 668.104448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.109645] RIP: 0033:0x459d27 [ 668.112934] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:19:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 668.132017] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 668.140363] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 668.147641] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 668.155016] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 668.162302] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 668.169665] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:04 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:04 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r9, 0xfffffffffffffefe) 10:19:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x20, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x162) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r1, 0x9}, &(0x7f0000000100)=0x8) [ 668.401374] FAULT_INJECTION: forcing a failure. [ 668.401374] name failslab, interval 1, probability 0, space 0, times 0 [ 668.434420] CPU: 1 PID: 31526 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 668.442288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.451746] Call Trace: [ 668.454369] dump_stack+0x197/0x210 [ 668.458030] should_fail.cold+0xa/0x1b [ 668.461953] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 668.467111] ? lockdep_hardirqs_on+0x415/0x5d0 [ 668.471734] __should_failslab+0x121/0x190 [ 668.475995] should_failslab+0x9/0x14 [ 668.479843] kmem_cache_alloc+0x2ae/0x700 [ 668.484013] ? map_id_range_down+0x1ee/0x370 [ 668.488444] ? __put_user_ns+0x70/0x70 [ 668.492358] selinux_inode_alloc_security+0xb6/0x2a0 [ 668.497577] security_inode_alloc+0x8a/0xd0 [ 668.501932] inode_init_always+0x56e/0xb40 [ 668.506195] alloc_inode+0x81/0x190 [ 668.509845] new_inode_pseudo+0x19/0xf0 [ 668.514212] new_inode+0x1f/0x40 [ 668.517603] __ext4_new_inode+0x3cb/0x52d0 [ 668.521859] ? kasan_check_read+0x11/0x20 [ 668.526037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.531601] ? ext4_free_inode+0x1470/0x1470 [ 668.536031] ? dquot_get_next_dqblk+0x180/0x180 [ 668.541592] ? selinux_determine_inode_label+0x1b1/0x360 [ 668.547089] ext4_mkdir+0x3d5/0xdf0 [ 668.550795] ? ext4_init_dot_dotdot+0x520/0x520 [ 668.555493] ? selinux_inode_mkdir+0x23/0x30 [ 668.559917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.565567] ? security_inode_mkdir+0xe4/0x120 [ 668.570174] vfs_mkdir+0x42e/0x690 [ 668.573761] do_mkdirat+0x234/0x2a0 [ 668.577406] ? __ia32_sys_mknod+0xb0/0xb0 [ 668.581571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 668.586349] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.591727] ? do_syscall_64+0x26/0x620 [ 668.595717] ? lockdep_hardirqs_on+0x415/0x5d0 [ 668.600603] __x64_sys_mkdir+0x5c/0x80 [ 668.604747] do_syscall_64+0xfd/0x620 [ 668.606118] kauditd_printk_skb: 1 callbacks suppressed [ 668.606131] audit: type=1800 audit(1576318744.715:524): pid=31516 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17151 res=0 [ 668.608581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.608594] RIP: 0033:0x459d27 [ 668.608610] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.608618] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 668.670818] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 668.678168] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 668.685445] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 668.692704] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 10:19:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x4, @loopback, 0x20}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 668.699973] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f00000002c0)={0x7, 0x6bea, 0x7}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000340)=0x68) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)=0x2) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000300)={@remote, r5}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r7, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0}]) fstat(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x9, 0x4e22, 0x5, 0x2, 0xa0, 0x0, 0x87, r5, r8}, {0x400, 0x40, 0x1, 0x101, 0xfb6, 0x7, 0x416, 0x6}, {0x0, 0x1, 0x595, 0x70a}, 0xfffffff8, 0x6e6bb4, 0x1, 0x0, 0x2, 0x3}, {{@in6=@mcast2, 0x4d5, 0xff}, 0x8, @in=@rand_addr=0x6, 0x3505, 0x4, 0x3, 0xff, 0x8, 0x6, 0x2}}, 0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x20) 10:19:05 executing program 2: 10:19:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14, 0xc0000) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000200)={'sit0\x00', 0x5}) 10:19:05 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 668.996192] FAULT_INJECTION: forcing a failure. [ 668.996192] name failslab, interval 1, probability 0, space 0, times 0 [ 669.011821] CPU: 1 PID: 31553 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 669.019867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.029331] Call Trace: [ 669.031963] dump_stack+0x197/0x210 [ 669.035640] should_fail.cold+0xa/0x1b [ 669.039556] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 669.044687] __should_failslab+0x121/0x190 [ 669.049121] should_failslab+0x9/0x14 [ 669.052966] __kmalloc+0x2e2/0x750 [ 669.056543] ? ext4_find_extent+0x76e/0x9d0 [ 669.060898] ext4_find_extent+0x76e/0x9d0 [ 669.065194] ext4_ext_map_blocks+0x1c3/0x55c0 [ 669.069721] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 669.074755] ? __lock_is_held+0xb6/0x140 [ 669.078840] ? lock_acquire+0x16f/0x3f0 [ 669.082841] ? ext4_map_blocks+0x4cf/0x1b20 [ 669.087190] ext4_map_blocks+0xf83/0x1b20 [ 669.091374] ? ext4_issue_zeroout+0x170/0x170 [ 669.095882] ? kasan_check_write+0x14/0x20 [ 669.100145] ? __brelse+0x95/0xb0 [ 669.103641] ext4_getblk+0xc4/0x510 [ 669.107280] ? ext4_iomap_begin+0xfd0/0xfd0 [ 669.111704] ? ext4_free_inode+0x1470/0x1470 [ 669.116127] ext4_bread+0x8f/0x230 [ 669.119680] ? ext4_getblk+0x510/0x510 [ 669.123604] ext4_append+0x155/0x370 [ 669.127335] ext4_mkdir+0x61b/0xdf0 [ 669.130982] ? ext4_init_dot_dotdot+0x520/0x520 [ 669.135669] ? selinux_inode_mkdir+0x23/0x30 [ 669.140108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.145667] ? security_inode_mkdir+0xe4/0x120 [ 669.150275] vfs_mkdir+0x42e/0x690 [ 669.153835] do_mkdirat+0x234/0x2a0 [ 669.157490] ? __ia32_sys_mknod+0xb0/0xb0 [ 669.161647] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.166444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.171823] ? do_syscall_64+0x26/0x620 [ 669.175818] ? lockdep_hardirqs_on+0x415/0x5d0 [ 669.180528] __x64_sys_mkdir+0x5c/0x80 [ 669.184432] do_syscall_64+0xfd/0x620 [ 669.188250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.193450] RIP: 0033:0x459d27 [ 669.197347] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.216260] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.224005] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 669.231318] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 669.238596] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 10:19:05 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x5, @loopback}], 0xfffffffffffffec5) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:05 executing program 2: [ 669.245876] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 669.253160] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 669.342115] ISOFS: Unable to identify CD-ROM format. 10:19:05 executing program 2: 10:19:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e21, 0x5, @loopback, 0x8}}, 0xfff9, 0x8}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r6, @in={{0x2, 0x4e23, @local}}}, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:05 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x8000, 0xfffffff9}, 0x20) 10:19:05 executing program 2: 10:19:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:05 executing program 2: [ 669.575310] FAULT_INJECTION: forcing a failure. [ 669.575310] name failslab, interval 1, probability 0, space 0, times 0 [ 669.587429] CPU: 0 PID: 31576 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 669.595252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.604612] Call Trace: [ 669.604676] dump_stack+0x197/0x210 [ 669.604698] should_fail.cold+0xa/0x1b [ 669.604717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 669.604734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 10:19:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) mq_timedsend(r1, &(0x7f00000000c0)="e653d173ddb2cd5c46ecbf639ced86b357714075d5e5a818e13bc58bea1011e035e242454b1760d604fd970c23c5351cf68094489e0939bb78b2330fc777ef1b9cc3e106df2972577734db1cde029278c4c6c054a20a79a500e7bb436ee9f30c8c446c11230bd82f5edb77b7c1bb6fee1162dc847df8e5b8ef3411ee9752", 0x7e, 0x4, &(0x7f0000000140)={0x0, 0x1c9c380}) 10:19:05 executing program 2: [ 669.604756] __should_failslab+0x121/0x190 [ 669.604775] should_failslab+0x9/0x14 [ 669.604787] __kmalloc+0x71/0x750 [ 669.604807] ? context_struct_to_string+0x428/0x880 [ 669.604826] context_struct_to_string+0x428/0x880 [ 669.647039] ? security_load_policycaps+0x540/0x540 [ 669.652086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.657645] ? sidtab_search_core+0x1d0/0x320 [ 669.662165] security_sid_to_context_core.isra.0+0x226/0x2f0 [ 669.662189] security_sid_to_context_force+0x38/0x50 [ 669.662206] selinux_inode_init_security+0x3b6/0x7a0 [ 669.662224] ? selinux_inode_create+0x30/0x30 [ 669.662236] ? ext4_get_acl+0x107/0x5a0 [ 669.662252] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.662278] security_inode_init_security+0x1ad/0x3b0 [ 669.662291] ? ext4_init_acl+0x240/0x240 [ 669.662307] ? security_kernel_load_data+0xb0/0xb0 [ 669.662326] ? posix_acl_create+0x11a/0x450 [ 669.686797] ? lock_downgrade+0x880/0x880 [ 669.686822] ? ext4_set_acl+0x490/0x490 [ 669.686841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.710551] ? check_preemption_disabled+0x48/0x290 [ 669.729308] ext4_init_security+0x34/0x40 [ 669.733508] __ext4_new_inode+0x3b2f/0x52d0 [ 669.737856] ? ext4_free_inode+0x1470/0x1470 [ 669.737883] ? dquot_get_next_dqblk+0x180/0x180 [ 669.737903] ? selinux_determine_inode_label+0x1b1/0x360 [ 669.737924] ext4_mkdir+0x3d5/0xdf0 [ 669.752484] ? ext4_init_dot_dotdot+0x520/0x520 [ 669.752507] ? selinux_inode_mkdir+0x23/0x30 [ 669.752522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.752534] ? security_inode_mkdir+0xe4/0x120 [ 669.752554] vfs_mkdir+0x42e/0x690 [ 669.752572] do_mkdirat+0x234/0x2a0 [ 669.752590] ? __ia32_sys_mknod+0xb0/0xb0 [ 669.752603] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 669.752624] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.765617] ? do_syscall_64+0x26/0x620 [ 669.765637] ? lockdep_hardirqs_on+0x415/0x5d0 [ 669.765657] __x64_sys_mkdir+0x5c/0x80 [ 669.765676] do_syscall_64+0xfd/0x620 [ 669.813462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.818665] RIP: 0033:0x459d27 [ 669.821880] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.840880] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.848599] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 669.848608] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 669.848616] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 669.848625] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 669.848633] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 669.850660] audit: type=1800 audit(1576318746.105:525): pid=31587 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17184 res=0 10:19:06 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 10:19:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) sendto$inet(r1, &(0x7f0000000040)="2de769beae874e71d97016f9dd7ef1796d9b471082116a6abe53ed9d28289f083cbfc29909047cd8fc373d7e28", 0x2d, 0x26000000, &(0x7f00000000c0)={0x2, 0x4e21, @rand_addr=0x7}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x200, @rand_addr="6f51e78bb846eb6bf8f729e1fe663be8", 0x400}, 0xd4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:06 executing program 2: r0 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) 10:19:06 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 670.150537] FAULT_INJECTION: forcing a failure. [ 670.150537] name failslab, interval 1, probability 0, space 0, times 0 [ 670.162506] CPU: 0 PID: 31593 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 670.170329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.179698] Call Trace: [ 670.182336] dump_stack+0x197/0x210 [ 670.185989] should_fail.cold+0xa/0x1b [ 670.189904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 670.195033] ? save_stack+0xa9/0xd0 [ 670.198686] ? __es_tree_search.isra.0+0x1bf/0x230 [ 670.203650] __should_failslab+0x121/0x190 [ 670.207891] should_failslab+0x9/0x14 [ 670.211705] kmem_cache_alloc+0x47/0x700 [ 670.215798] ? ext4_es_scan+0x730/0x730 [ 670.219792] __es_insert_extent+0x2cc/0xf20 [ 670.224132] ? do_raw_write_lock+0xbd/0x1e0 [ 670.228477] ext4_es_insert_extent+0x27e/0x640 [ 670.233545] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 670.239373] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.244414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.249992] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 670.255825] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 670.260710] ? ext4_zeroout_es+0x180/0x180 [ 670.264965] ? ext4_find_extent+0x76e/0x9d0 [ 670.269318] ? ext4_find_extent+0x6a6/0x9d0 [ 670.273674] ext4_ext_map_blocks+0x204c/0x55c0 [ 670.278288] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 670.283320] ? __lock_is_held+0xb6/0x140 [ 670.287412] ? lock_acquire+0x16f/0x3f0 [ 670.291417] ? ext4_map_blocks+0x4cf/0x1b20 [ 670.295765] ext4_map_blocks+0xf83/0x1b20 [ 670.299927] ? ext4_issue_zeroout+0x170/0x170 [ 670.299948] ? kasan_check_write+0x14/0x20 [ 670.308686] ? __brelse+0x95/0xb0 [ 670.312178] ext4_getblk+0xc4/0x510 [ 670.315819] ? ext4_iomap_begin+0xfd0/0xfd0 [ 670.320161] ? ext4_free_inode+0x1470/0x1470 [ 670.324587] ext4_bread+0x8f/0x230 [ 670.328141] ? ext4_getblk+0x510/0x510 [ 670.332171] ext4_append+0x155/0x370 [ 670.335919] ext4_mkdir+0x61b/0xdf0 [ 670.339585] ? ext4_init_dot_dotdot+0x520/0x520 [ 670.344409] ? selinux_inode_mkdir+0x23/0x30 10:19:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x4ff, @dev={0xfe, 0x80, [], 0xd}, 0x87}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 670.348845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.354433] ? security_inode_mkdir+0xe4/0x120 [ 670.359054] vfs_mkdir+0x42e/0x690 [ 670.362627] do_mkdirat+0x234/0x2a0 [ 670.366281] ? __ia32_sys_mknod+0xb0/0xb0 [ 670.370451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 670.375224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.380602] ? do_syscall_64+0x26/0x620 [ 670.384601] ? lockdep_hardirqs_on+0x415/0x5d0 [ 670.389214] __x64_sys_mkdir+0x5c/0x80 [ 670.393143] do_syscall_64+0xfd/0x620 [ 670.396970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.402168] RIP: 0033:0x459d27 [ 670.405374] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.424286] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 670.424301] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 670.424309] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 10:19:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 670.424316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 670.424325] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 670.424333] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 670.440889] ISOFS: Unable to identify CD-ROM format. 10:19:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x3d4}, 0x20) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000040)=0xa4) syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe000000000000, 0x4000) [ 670.545468] audit: type=1800 audit(1576318746.825:526): pid=31607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=29 res=0 10:19:06 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000180)=0xdbe) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0xa, 0x7f, 0x6, 0xd, 0x0, 0x70bd2c, 0x25dfdbfd, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}, @sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@loopback, 0x5, 0x20, 0x8}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e20}, @sadb_lifetime={0x4, 0x6, 0x400000, 0x5, 0x80f8, 0x2}]}, 0x68}}, 0x24040004) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 670.671984] FAULT_INJECTION: forcing a failure. [ 670.671984] name failslab, interval 1, probability 0, space 0, times 0 [ 670.683444] CPU: 0 PID: 31622 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 670.691528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.700987] Call Trace: [ 670.703642] dump_stack+0x197/0x210 [ 670.707383] should_fail.cold+0xa/0x1b [ 670.711287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 670.716403] ? save_stack+0xa9/0xd0 [ 670.720477] ? __es_tree_search.isra.0+0x1bf/0x230 [ 670.725435] __should_failslab+0x121/0x190 [ 670.729705] should_failslab+0x9/0x14 [ 670.733522] kmem_cache_alloc+0x47/0x700 [ 670.737603] ? ext4_es_scan+0x730/0x730 [ 670.741603] __es_insert_extent+0x2cc/0xf20 [ 670.745942] ? do_raw_write_lock+0xbd/0x1e0 [ 670.750285] ext4_es_insert_extent+0x27e/0x640 [ 670.754891] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 670.760711] ? rcu_read_lock_sched_held+0x110/0x130 [ 670.765740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.771293] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 670.777116] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 670.782005] ? ext4_zeroout_es+0x180/0x180 [ 670.786255] ? ext4_find_extent+0x76e/0x9d0 [ 670.790592] ? ext4_find_extent+0x6a6/0x9d0 [ 670.794957] ext4_ext_map_blocks+0x204c/0x55c0 [ 670.799574] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 670.804607] ? __lock_is_held+0xb6/0x140 [ 670.808690] ? lock_acquire+0x16f/0x3f0 [ 670.812706] ? ext4_map_blocks+0x4cf/0x1b20 [ 670.817050] ext4_map_blocks+0xf83/0x1b20 [ 670.821578] ? ext4_issue_zeroout+0x170/0x170 [ 670.826213] ? kasan_check_write+0x14/0x20 [ 670.830479] ? __brelse+0x95/0xb0 [ 670.834048] ext4_getblk+0xc4/0x510 [ 670.837694] ? ext4_iomap_begin+0xfd0/0xfd0 [ 670.842126] ? ext4_free_inode+0x1470/0x1470 [ 670.846604] ext4_bread+0x8f/0x230 [ 670.850178] ? ext4_getblk+0x510/0x510 [ 670.854105] ext4_append+0x155/0x370 [ 670.857838] ext4_mkdir+0x61b/0xdf0 [ 670.861490] ? ext4_init_dot_dotdot+0x520/0x520 [ 670.866178] ? selinux_inode_mkdir+0x23/0x30 [ 670.870639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.877144] ? security_inode_mkdir+0xe4/0x120 [ 670.881744] vfs_mkdir+0x42e/0x690 [ 670.885303] do_mkdirat+0x234/0x2a0 [ 670.888944] ? __ia32_sys_mknod+0xb0/0xb0 [ 670.893110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 670.897882] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.903294] ? do_syscall_64+0x26/0x620 [ 670.907981] ? lockdep_hardirqs_on+0x415/0x5d0 [ 670.912580] __x64_sys_mkdir+0x5c/0x80 [ 670.916604] do_syscall_64+0xfd/0x620 [ 670.920440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.925640] RIP: 0033:0x459d27 [ 670.928846] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.947762] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 670.955497] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 670.962785] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 670.970098] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 670.977381] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 670.984676] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 671.035281] ISOFS: Unable to identify CD-ROM format. 10:19:07 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) socket$inet6_sctp(0xa, 0x801, 0x84) 10:19:07 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 671.126081] audit: type=1800 audit(1576318747.405:527): pid=31627 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=30 res=0 10:19:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:07 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 671.266258] FAULT_INJECTION: forcing a failure. [ 671.266258] name failslab, interval 1, probability 0, space 0, times 0 [ 671.285085] CPU: 1 PID: 31632 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 671.293427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.302985] Call Trace: [ 671.305629] dump_stack+0x197/0x210 [ 671.309289] should_fail.cold+0xa/0x1b [ 671.313200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 671.318531] __should_failslab+0x121/0x190 [ 671.322837] should_failslab+0x9/0x14 [ 671.326667] kmem_cache_alloc+0x2ae/0x700 [ 671.333019] ? rcu_read_lock_sched_held+0x110/0x130 [ 671.338067] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 671.344009] ? __mark_inode_dirty+0x241/0x1280 [ 671.349080] ext4_mb_new_blocks+0x5a0/0x3dd0 [ 671.353889] ? ext4_find_extent+0x76e/0x9d0 [ 671.359008] ext4_ext_map_blocks+0x2b26/0x55c0 [ 671.364337] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 671.369584] ? __lock_is_held+0xb6/0x140 [ 671.373784] ext4_map_blocks+0x990/0x1b20 [ 671.377980] ? ext4_issue_zeroout+0x170/0x170 [ 671.382512] ? kasan_check_write+0x14/0x20 [ 671.386765] ? __brelse+0x95/0xb0 [ 671.390250] ext4_getblk+0xc4/0x510 [ 671.393908] ? ext4_iomap_begin+0xfd0/0xfd0 [ 671.398266] ? ext4_free_inode+0x1470/0x1470 [ 671.402709] ext4_bread+0x8f/0x230 [ 671.406319] ? ext4_getblk+0x510/0x510 [ 671.410495] ext4_append+0x155/0x370 [ 671.414261] ext4_mkdir+0x61b/0xdf0 [ 671.414286] ? ext4_init_dot_dotdot+0x520/0x520 [ 671.414305] ? selinux_inode_mkdir+0x23/0x30 [ 671.428013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.433697] ? security_inode_mkdir+0xe4/0x120 [ 671.438406] vfs_mkdir+0x42e/0x690 [ 671.441988] do_mkdirat+0x234/0x2a0 [ 671.445795] ? __ia32_sys_mknod+0xb0/0xb0 [ 671.449967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.454780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.460167] ? do_syscall_64+0x26/0x620 [ 671.464161] ? lockdep_hardirqs_on+0x415/0x5d0 [ 671.468855] __x64_sys_mkdir+0x5c/0x80 [ 671.472758] do_syscall_64+0xfd/0x620 [ 671.476571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.481771] RIP: 0033:0x459d27 [ 671.484971] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.503971] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 10:19:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xfffffffffffffe0a, &(0x7f0000000100)=[@in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000000180)=0xffffffffffffff3d) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xa8, 0x4, 0x0, "851290759f351722e8c9c02f8d5bce68", "2f3925b93887c67d41bdbba6031ec0218ce4b34cba32f16af74e234fc8d6c66235f4747756483f554c1a19095ba10d34158c9dee3f8c62ce68b9514fbb8e574b5ddb35edb15a0f10ddb2f84fe6791e21667dd61c2c9bc071cb1d5ca857681ecaf6d883e1808aafef08e17afa80ddd70ef66ea0e27eab6c77cc3635758a2da77baa120dcf6fe5654220ebf119bd6a2f49be1b57"}, 0xa8, 0x1) 10:19:07 executing program 4: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x11) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f00000002c0)={0x7c}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) mount$9p_virtio(&(0x7f0000000040)='syz\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x80480, &(0x7f00000001c0)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x8}}, {@afid={'afid', 0x3d, 0x2}}, {@version_L='version=9p2000.L'}, {@access_any='access=any'}, {@uname={'uname', 0x3d, 'md5sum'}}], [{@measure='measure'}, {@hash='hash'}]}}) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x80000000, @dev={0xfe, 0x80, [], 0x22}}], 0xfffffffffffffff0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="922e01000000", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x20, 0x800, 0x0, 0x3ff, 0x763, 0x0, 0x0, 0x5e4b, r6}, 0x20) [ 671.511695] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 671.518976] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 671.526256] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 671.534921] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 671.543077] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:08 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 671.690029] audit: type=1800 audit(1576318747.965:528): pid=31646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=31 res=0 [ 671.755524] audit: type=1804 audit(1576318747.975:529): pid=31646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/914/file0/file0" dev="loop1" ino=31 res=1 [ 671.853179] FAULT_INJECTION: forcing a failure. [ 671.853179] name failslab, interval 1, probability 0, space 0, times 0 [ 671.896027] CPU: 1 PID: 31651 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 671.903901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.913270] Call Trace: [ 671.915890] dump_stack+0x197/0x210 [ 671.919544] should_fail.cold+0xa/0x1b [ 671.923464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 671.929103] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 671.934927] __should_failslab+0x121/0x190 [ 671.939172] should_failslab+0x9/0x14 [ 671.942992] __kmalloc+0x2e2/0x750 [ 671.946548] ? ext4_find_extent+0x76e/0x9d0 [ 671.951113] ext4_find_extent+0x76e/0x9d0 [ 671.955286] ext4_ext_map_blocks+0x1c3/0x55c0 [ 671.959829] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 671.964871] ? __lock_is_held+0xb6/0x140 [ 671.968960] ? lock_acquire+0x16f/0x3f0 [ 671.972946] ? ext4_map_blocks+0x928/0x1b20 [ 671.977311] ext4_map_blocks+0x990/0x1b20 [ 671.981505] ? ext4_issue_zeroout+0x170/0x170 [ 671.986112] ? kasan_check_write+0x14/0x20 [ 671.990363] ? __brelse+0x95/0xb0 [ 671.993850] ext4_getblk+0xc4/0x510 [ 671.997730] ? ext4_iomap_begin+0xfd0/0xfd0 [ 672.002082] ? ext4_free_inode+0x1470/0x1470 [ 672.006638] ext4_bread+0x8f/0x230 [ 672.010199] ? ext4_getblk+0x510/0x510 [ 672.014289] ext4_append+0x155/0x370 [ 672.018127] ext4_mkdir+0x61b/0xdf0 [ 672.021790] ? ext4_init_dot_dotdot+0x520/0x520 [ 672.026477] ? selinux_inode_mkdir+0x23/0x30 [ 672.030921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.036591] ? security_inode_mkdir+0xe4/0x120 [ 672.041214] vfs_mkdir+0x42e/0x690 [ 672.044778] do_mkdirat+0x234/0x2a0 [ 672.048418] ? __ia32_sys_mknod+0xb0/0xb0 [ 672.052577] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 672.057344] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.062716] ? do_syscall_64+0x26/0x620 [ 672.066873] ? lockdep_hardirqs_on+0x415/0x5d0 [ 672.071485] __x64_sys_mkdir+0x5c/0x80 [ 672.075411] do_syscall_64+0xfd/0x620 [ 672.079241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.084446] RIP: 0033:0x459d27 [ 672.087654] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.106569] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 672.114311] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 672.121620] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 672.129007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 672.136327] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 672.144997] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x80000000, &(0x7f00000000c0)) 10:19:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x1, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000140)={r7, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=r7, @ANYBLOB="fec367e371c60f49337904cc19b6188e60b749fa48a133305e946080c69be6496513813de1cb609150bc50aa25a6cdbc1a59ad6e159842a090"], &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r8, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:09 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8, 0x4, 0x5, 0xbe, 0x40}, &(0x7f00000004c0)=0x14) 10:19:09 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x2) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000040)={0x3, 0xcd, 0x40, 0x8, 0x3f}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 673.667300] FAULT_INJECTION: forcing a failure. [ 673.667300] name failslab, interval 1, probability 0, space 0, times 0 [ 673.679258] CPU: 0 PID: 31664 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 673.680164] audit: type=1800 audit(1576318749.955:530): pid=31660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=32 res=0 [ 673.687085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.687092] Call Trace: [ 673.687116] dump_stack+0x197/0x210 [ 673.687137] should_fail.cold+0xa/0x1b [ 673.687162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 673.719167] ? mark_held_locks+0xb1/0x100 [ 673.719184] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 673.719201] ? __es_tree_search.isra.0+0x1bf/0x230 [ 673.719228] __should_failslab+0x121/0x190 [ 673.753124] should_failslab+0x9/0x14 [ 673.756953] kmem_cache_alloc+0x47/0x700 [ 673.761041] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 673.766092] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 673.770873] ? ext4_es_scan+0x730/0x730 [ 673.774880] __es_insert_extent+0x2cc/0xf20 [ 673.779224] ? do_raw_write_lock+0xbd/0x1e0 [ 673.779252] ext4_es_insert_extent+0x27e/0x640 [ 673.779275] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 673.779306] ext4_map_blocks+0xc3f/0x1b20 [ 673.798232] ? ext4_issue_zeroout+0x170/0x170 [ 673.802764] ? kasan_check_write+0x14/0x20 [ 673.807286] ? __brelse+0x95/0xb0 [ 673.810797] ext4_getblk+0xc4/0x510 10:19:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) [ 673.814455] ? ext4_iomap_begin+0xfd0/0xfd0 [ 673.818806] ? ext4_free_inode+0x1470/0x1470 [ 673.823250] ext4_bread+0x8f/0x230 [ 673.826845] ? ext4_getblk+0x510/0x510 [ 673.830789] ext4_append+0x155/0x370 [ 673.834537] ext4_mkdir+0x61b/0xdf0 [ 673.836572] audit: type=1804 audit(1576318749.995:531): pid=31660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/915/file0/file0" dev="loop1" ino=32 res=1 [ 673.838228] ? ext4_init_dot_dotdot+0x520/0x520 [ 673.838250] ? selinux_inode_mkdir+0x23/0x30 [ 673.838267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.838281] ? security_inode_mkdir+0xe4/0x120 [ 673.838299] vfs_mkdir+0x42e/0x690 [ 673.838317] do_mkdirat+0x234/0x2a0 [ 673.870259] ? __ia32_sys_mknod+0xb0/0xb0 [ 673.870277] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 673.870296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.870311] ? do_syscall_64+0x26/0x620 [ 673.870330] ? lockdep_hardirqs_on+0x415/0x5d0 [ 673.870346] __x64_sys_mkdir+0x5c/0x80 [ 673.910348] do_syscall_64+0xfd/0x620 [ 673.910371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.910384] RIP: 0033:0x459d27 [ 673.910399] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.910408] RSP: 002b:00007f6960be2a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 673.910422] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 0000000000459d27 [ 673.910430] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 673.910447] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 673.965247] R10: 0000000000000075 R11: 0000000000000246 R12: 00007f6960be36d4 [ 673.965257] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 673.983136] ISOFS: Unable to identify CD-ROM format. 10:19:10 executing program 2: shutdown(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000002c0)=""/169, 0xa9}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000024c0)=""/8, 0x8}], 0x9}, 0x40002) shutdown(r2, 0x0) 10:19:10 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 674.160015] FAULT_INJECTION: forcing a failure. [ 674.160015] name failslab, interval 1, probability 0, space 0, times 0 [ 674.208772] CPU: 0 PID: 31681 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 674.216780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.226269] Call Trace: [ 674.228925] dump_stack+0x197/0x210 [ 674.232598] should_fail.cold+0xa/0x1b [ 674.236526] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 674.241667] ? lock_downgrade+0x880/0x880 [ 674.245858] __should_failslab+0x121/0x190 [ 674.250124] should_failslab+0x9/0x14 [ 674.253953] __kmalloc_track_caller+0x2de/0x750 [ 674.258655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.264300] ? strndup_user+0x77/0xd0 [ 674.268168] memdup_user+0x26/0xb0 [ 674.271744] strndup_user+0x77/0xd0 [ 674.275396] ksys_mount+0x7b/0x150 [ 674.278962] __x64_sys_mount+0xbe/0x150 [ 674.282969] do_syscall_64+0xfd/0x620 [ 674.286800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.292021] RIP: 0033:0x45d35a [ 674.295258] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 674.314176] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 674.321912] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 674.329210] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 674.336531] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 674.343824] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 674.352010] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 674.404786] audit: type=1800 audit(1576318750.685:532): pid=31669 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17217 res=0 10:19:10 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 10:19:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x200000}, &(0x7f0000000080)=0x8) 10:19:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000140)={{0x6c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x1, 'lc\x00', 0x1, 0x1, 0xa}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e22, 0x10000, 0x800, 0x8, 0x5}}, 0x44) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x1, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000002c0)={0x0, 'veth1_to_team\x00', 0x2}, 0x18) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000280)) r6 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$inet_mreqsrc(r6, 0x0, 0x26, &(0x7f00000000c0)={@multicast1, @remote, @multicast1}, 0xc) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) 10:19:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:10 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 674.602599] IPVS: set_ctl: invalid protocol: 108 172.30.1.5:20000 10:19:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0x8}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x3, @empty, 0x7}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, @in6={0xa, 0x4e21, 0x1ff, @empty, 0x1}, @in6={0xa, 0x4e20, 0x7, @empty, 0xffff}, @in6={0xa, 0x4e23, 0x4, @ipv4={[], [], @local}, 0x8}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e23, @rand_addr=0x80000000}], 0xcc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x4000) [ 674.667219] IPVS: set_ctl: invalid protocol: 108 172.30.1.5:20000 [ 674.720219] audit: type=1800 audit(1576318750.995:533): pid=31702 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=33 res=0 [ 674.757333] FAULT_INJECTION: forcing a failure. [ 674.757333] name failslab, interval 1, probability 0, space 0, times 0 [ 674.791725] CPU: 1 PID: 31703 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 674.799593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.806513] audit: type=1800 audit(1576318751.025:534): pid=31700 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17201 res=0 [ 674.808963] Call Trace: [ 674.833546] dump_stack+0x197/0x210 [ 674.837209] should_fail.cold+0xa/0x1b [ 674.841128] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 674.846250] ? lock_downgrade+0x880/0x880 [ 674.850418] __should_failslab+0x121/0x190 [ 674.854686] should_failslab+0x9/0x14 [ 674.860419] kmem_cache_alloc+0x2ae/0x700 [ 674.864598] ? find_held_lock+0x35/0x130 [ 674.868765] ? fs_reclaim_acquire+0x20/0x20 [ 674.873193] getname_flags+0xd6/0x5b0 [ 674.877042] user_path_at_empty+0x2f/0x50 [ 674.877917] audit: type=1804 audit(1576318751.025:535): pid=31702 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/916/file0/file0" dev="loop1" ino=33 res=1 [ 674.881204] do_mount+0x150/0x2bc0 [ 674.881226] ? rcu_read_lock_sched_held+0x110/0x130 [ 674.881240] ? copy_mount_string+0x40/0x40 [ 674.881255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.881275] ? _copy_from_user+0xdd/0x150 [ 674.931172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.936740] ? copy_mount_options+0x280/0x3a0 [ 674.941292] ksys_mount+0xdb/0x150 [ 674.944857] __x64_sys_mount+0xbe/0x150 [ 674.948861] do_syscall_64+0xfd/0x620 [ 674.952704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.957930] RIP: 0033:0x45d35a [ 674.961150] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 674.980244] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 10:19:11 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='eql\x00') r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x20) [ 674.987988] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 674.995286] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 675.002600] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 675.010255] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 675.017627] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r2, &(0x7f0000000100)=0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) kcmp(r1, r2, 0x6, r3, r4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e24, 0x4, @local, 0x9}, @in6={0xa, 0x4e20, 0xfffffffa, @rand_addr="cfc57c4481da0c46d8c2f89ffdeef8ac", 0x5}, @in6={0xa, 0x4e20, 0x9, @rand_addr="8ea5c0a3eced9774a5c8d4096a4f47fc", 0x6}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x74) 10:19:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r2, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) setsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000180)=0x81, 0x2) accept(r1, &(0x7f00000000c0)=@alg, &(0x7f0000000040)=0x80) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) ioctl$RTC_IRQP_READ(r7, 0x8008700b, &(0x7f00000001c0)) close(r5) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r8, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) 10:19:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$isdn_base(0x22, 0x3, 0x0) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @mcast2, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:11 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) 10:19:11 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x74, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x2b}, 0x3}, @in6={0xa, 0x4e21, 0x285e, @loopback, 0x2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, @in6={0xa, 0x4e24, 0x9c7, @local, 0x8}, @in={0x2, 0x4e23, @broadcast}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0xffffffffffffffff, r4) syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./bus\x00', 0x5, 0x3, &(0x7f0000000280)=[{&(0x7f0000000240)="4aa35e870dba202a76eee6d64fd8abcdef655b5d159038088a919fc17531081a5176fe2d11df955c7a62940cd45e31c7b229693596dc673477d3", 0x3a, 0xffff}, {&(0x7f0000000340)="daa0605675bc92365054caef449b5a3f214d2ed3367ac898ea745fcd9e3e02a56859eaa91407703f4157328c36be54a13b440d03feb6b71a72290d4041ca0b53018c586d629965af6d5b8516907c875b8bb638ac37f8676f2473d6ecb516a53b46e4674cf57b72fecbad0ca879ae1bae9686c9f79904b7fd6ff1949e834e61c9c183c043862c9c8fc754fa578e821ed52d47d02be5359b0aef7eb8232ca5c6e7650629396688727235a4c18235ba0ec6c9094bc072846e4b8bd7c044ac837cb1d862ab02f23401d3c4ce624c6ea28c3f299ac32d29137b2bfd9b3146635f466ccc54ab02db7389777100", 0xea, 0x100000001}, {&(0x7f0000000440)="f4cbf047263d6bef87c6d0d7bccc9b4b3986e0429c25f21442f5f6f0ef4497a65b532865908a9c0406219198f1c13840320127c7a97df4f667077aca85a3a6cf1691344e16eebeeea2faf38681e080d8efcc90a08acb1fad3a3deea913f059e9d417692b41856246ca64cf0e2db03acf8fee6dd426624582f5003f74dae1f7e84bd840cd724e3615d5738b878735028e9eeb34b442dd548bb4e66ed74910b3cf3bf5ca8e06add1018f", 0xa9, 0x4}], 0x1000, &(0x7f0000000500)={[{@quota_on='quota=on'}, {@spectator='spectator'}, {@data_ordered='data=ordered'}], [{@fowner_lt={'fowner<', r4}}]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000100)={0x5e, 0x1000, [0x2, 0x100, 0x200, 0x20, 0x2], 0x200}) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r1, r5, 0x0, 0x80001d00c0d0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f00000000c0)) 10:19:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 675.567213] FAULT_INJECTION: forcing a failure. [ 675.567213] name failslab, interval 1, probability 0, space 0, times 0 10:19:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 675.608511] CPU: 0 PID: 31737 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 675.616373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.616381] Call Trace: [ 675.616406] dump_stack+0x197/0x210 [ 675.616429] should_fail.cold+0xa/0x1b [ 675.635956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 675.635975] ? lock_downgrade+0x880/0x880 [ 675.636003] __should_failslab+0x121/0x190 [ 675.649501] should_failslab+0x9/0x14 [ 675.653330] kmem_cache_alloc+0x2ae/0x700 [ 675.657498] ? find_held_lock+0x35/0x130 [ 675.661575] ? fs_reclaim_acquire+0x20/0x20 [ 675.665921] getname_flags+0xd6/0x5b0 [ 675.669745] user_path_at_empty+0x2f/0x50 [ 675.673916] do_mount+0x150/0x2bc0 [ 675.677487] ? rcu_read_lock_sched_held+0x110/0x130 [ 675.682548] ? copy_mount_string+0x40/0x40 [ 675.686799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 675.692366] ? _copy_from_user+0xdd/0x150 [ 675.696535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.702315] ? copy_mount_options+0x280/0x3a0 [ 675.706841] ksys_mount+0xdb/0x150 [ 675.710402] __x64_sys_mount+0xbe/0x150 [ 675.714411] do_syscall_64+0xfd/0x620 [ 675.718229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.723458] RIP: 0033:0x45d35a [ 675.726668] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 675.745586] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 675.745601] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 675.745608] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 675.745616] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 675.745624] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 675.745632] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:12 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 675.880791] audit: type=1800 audit(1576318752.155:536): pid=31745 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=34 res=0 10:19:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 675.927804] audit: type=1804 audit(1576318752.165:537): pid=31745 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/917/file0/file0" dev="loop1" ino=34 res=1 [ 675.967136] audit: type=1800 audit(1576318752.165:538): pid=31745 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=34 res=0 [ 675.990270] audit: type=1800 audit(1576318752.195:539): pid=31722 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17206 res=0 [ 676.032550] FAULT_INJECTION: forcing a failure. [ 676.032550] name failslab, interval 1, probability 0, space 0, times 0 [ 676.065196] CPU: 1 PID: 31753 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 676.073100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.082511] Call Trace: [ 676.085131] dump_stack+0x197/0x210 [ 676.088783] should_fail.cold+0xa/0x1b [ 676.092702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 676.097825] ? lock_downgrade+0x880/0x880 [ 676.101998] __should_failslab+0x121/0x190 [ 676.106246] should_failslab+0x9/0x14 [ 676.110087] kmem_cache_alloc+0x2ae/0x700 [ 676.114249] ? find_held_lock+0x35/0x130 [ 676.118318] ? fs_reclaim_acquire+0x20/0x20 [ 676.122654] getname_flags+0xd6/0x5b0 [ 676.126567] user_path_at_empty+0x2f/0x50 [ 676.130723] do_mount+0x150/0x2bc0 [ 676.134291] ? rcu_read_lock_sched_held+0x110/0x130 [ 676.139317] ? copy_mount_string+0x40/0x40 [ 676.143563] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.149131] ? _copy_from_user+0xdd/0x150 [ 676.153289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.158844] ? copy_mount_options+0x280/0x3a0 [ 676.163357] ksys_mount+0xdb/0x150 [ 676.166910] __x64_sys_mount+0xbe/0x150 [ 676.170899] do_syscall_64+0xfd/0x620 [ 676.174717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.180097] RIP: 0033:0x45d35a [ 676.183300] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 676.202235] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 676.209973] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 676.217249] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 676.224540] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:12 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) connect$vsock_dgram(r2, &(0x7f0000000680)={0x28, 0x0, 0x2710, @reserved}, 0x10) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@null=' \x00', 0xb, 'lapb0\x00'}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/34, 0x22}, {&(0x7f0000000240)=""/73, 0x49}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f0000000300)=""/234, 0xea}, {&(0x7f0000000400)=""/74, 0x4a}, {&(0x7f0000000480)=""/64, 0x40}], 0x6, &(0x7f0000000540)=""/65, 0x41}, 0x10000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000640)={r0, r4}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 676.231815] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 676.239145] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:12 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:12 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) [ 676.429102] FAULT_INJECTION: forcing a failure. [ 676.429102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 676.440994] CPU: 0 PID: 31765 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 676.448831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.458200] Call Trace: [ 676.460815] dump_stack+0x197/0x210 [ 676.464473] should_fail.cold+0xa/0x1b [ 676.468389] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 676.473517] ? debug_smp_processor_id+0x1c/0x20 [ 676.478217] ? perf_trace_lock+0xeb/0x510 [ 676.482393] ? mark_held_locks+0x100/0x100 [ 676.486655] __alloc_pages_nodemask+0x1ee/0x750 [ 676.491355] ? __alloc_pages_slowpath+0x2870/0x2870 [ 676.496388] ? find_held_lock+0x35/0x130 [ 676.500480] cache_grow_begin+0x91/0x8c0 [ 676.504563] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.510123] ? check_preemption_disabled+0x48/0x290 [ 676.515173] kmem_cache_alloc+0x63b/0x700 [ 676.519328] getname_flags+0xd6/0x5b0 [ 676.523133] user_path_at_empty+0x2f/0x50 [ 676.527598] do_mount+0x150/0x2bc0 [ 676.531138] ? rcu_read_lock_sched_held+0x110/0x130 [ 676.536147] ? copy_mount_string+0x40/0x40 [ 676.540398] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.545959] ? _copy_from_user+0xdd/0x150 [ 676.550168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.555716] ? copy_mount_options+0x280/0x3a0 [ 676.560212] ksys_mount+0xdb/0x150 [ 676.563756] __x64_sys_mount+0xbe/0x150 [ 676.567728] do_syscall_64+0xfd/0x620 [ 676.571528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.576719] RIP: 0033:0x45d35a [ 676.579991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 676.598885] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 676.606590] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 676.613850] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 676.621121] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000180)=0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000300)={@remote, r5}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = getpid() r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r12, &(0x7f0000000100)=0x0, &(0x7f0000000180)) r13 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video1\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r14) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r15, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r14, 0x0}]) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r18) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r19, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r18, 0x0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r20) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r21, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r20, 0x0}]) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) r24 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) r27 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0xffffffffffffffff, r28) r29 = getgid() socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) r32 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='gidr', @ANYRESHEX=r33, @ANYBLOB=',\x00']) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r35) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r37, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r35, 0x0}]) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r38, 0x8912, 0x400200) r39 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r39, 0x0, 0x10, 0x0, &(0x7f0000000300)) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r40, r40) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r40, 0x29, 0x15, &(0x7f0000000300)={@remote, r41}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)={0x6, 0xfc, 0x1, 0x9, 0x2, r39, 0x7, [], r41, r4, 0x4, 0x5}, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r42) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r43, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r42, 0x0}]) r44 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r44, 0x0, 0x10, 0x0, &(0x7f0000000300)) r45 = accept4$tipc(r44, &(0x7f0000001400)=@name, &(0x7f0000001440)=0x10, 0x0) r46 = fcntl$getown(r45, 0x9) get_robust_list(r46, &(0x7f0000000100)=0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r48 = getpid() r49 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(r47, &(0x7f0000004600)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r48, r50}}}], 0x20}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r52) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r53, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r52, 0x0}]) r54 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/create\x00', 0x2, 0x0) r55 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r55, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid', 0x3d, r57}}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r58) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r59, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r58, 0x0}]) r60 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r60, 0x0, 0x10, 0x0, &(0x7f0000000300)) r61 = accept4$alg(r60, 0x0, 0x0, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r62) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r63, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r62, 0x0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r64) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r65, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r64, 0x0}]) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r66, 0x8912, 0x400200) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r67, 0x8912, 0x400200) r68 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r69, 0x8912, 0x400200) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r70, 0x8912, 0x400200) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r72, 0x8912, 0x400200) fstat(r72, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r75 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r75, &(0x7f0000000100)=0x0, &(0x7f0000000180)) r76 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r77, @ANYBLOB="4490"]) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r78, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r79) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r80, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r79, 0x0}]) r81 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r81, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid', 0x3d, r82}}]}) sendmmsg$unix(r6, &(0x7f00000012c0)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000340)="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", 0xfa}, {&(0x7f0000000100)="14f8ef3a00663625f28f66c9468b42a5ca029b1aef32f119662c0b90e688", 0x1e}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r12, r10, r11}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r13, r14, r16, r17]}}, @rights={{0x20, 0x1, 0x1, [r18, r20, r2, r23]}}, @rights={{0x14, 0x1, 0x1, [r24]}}, @rights={{0x18, 0x1, 0x1, [r25, r26]}}], 0xb0, 0xc018}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000600)="76406a5d2d69308259ff560e8a98c70155d3eca84531c0876376158c669977296b97fdc1f26bd01a6c5081c58a0fa736dd42d373ad0cf2bc1b67fd750a9db73bfa22c73176ef65f7b9b6b34fae140896423c85eafbec6efcef639fb24c743735406d910d63330488fcb88960160cbdd8b754b9fb96765fe10cb7c5ac691fa60b4f3f6753f60818150d05ef3f66677415e89693fad9fd9a1eb92f1b8ca154c7c9f04168436cd79396cd54c0283607cfb100f9faa8bc8ca0506f5793d1cf3fc075ca51292bcb788d3cb2a56bd354c51a6656ea938f2343", 0xd6}], 0x1, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {r12, r28, r29}}}, @rights={{0x18, 0x1, 0x1, [r22, r30]}}, @cred={{0x1c, 0x1, 0x2, {r9, r31, r33}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r34, r22, r24, r35, r38]}}, @cred={{0x1c, 0x1, 0x2, {r46, r50, r51}}}, @rights={{0x24, 0x1, 0x1, [r52, r2, 0xffffffffffffffff, r54, r14]}}, @cred={{0x1c, 0x1, 0x2, {r7, r10, r57}}}], 0xf0, 0x4004085}, {&(0x7f0000000980)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000a00)="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", 0xfc}], 0x1, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [r58, r22]}}, @rights={{0x38, 0x1, 0x1, [r61, r62, r64, r66, r38, r67, r68, r69, r70, r36]}}, @cred={{0x1c, 0x1, 0x2, {r56, 0xee01, r74}}}], 0x70, 0x1892e9743dad1ad8}, {&(0x7f0000000c40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000cc0)="1fb6fb4227d275fa2261486c6c4dbd328441d3e6b73122b335bbfedc17b07184b3d5b0e29c0092b0878efc40c088e52c5c27ff8797e6aba8850c8d6f595e1dc32014524575444ed338515e3b56e4e469b45cb485c4a95f4ebf1234c22f18c73e0d4d4ff7120e000611376294cafdfe3171226fb4ab11c5d894f4a416a3e9d81d5a5cb85c6182d2e1fbcc6e3c080746c2067312251887fd3789d3fe23782daf5efa6025cd752343", 0xa7}, {&(0x7f0000000d80)="2ece972870d076968b52312895df6f6f9410dc238f3a4c313f48d9afc046884ed2daacf468dd0acdc2589c1339500dcb8433dfa073fd9668cf1049616d4ed6e2b1370cf4af0a679c981565f1ccd3ffb4fd46e3f19bbe231f0e5de00a1411b31e6e2ed84d026e35a55d43f774c1ae0e7124924b4e14ac8e4c818531d464215424787b037e51bb395b01bcbf1ecab10d", 0x8f}, {&(0x7f0000000e40)="65d4154516", 0x5}, {&(0x7f0000000e80)="10acbe692142b8a3b192f9ecf37ee29cbc94202800c0d1facfc8c1323578e9d988c128b3c4e7ba6e6ed9d7e92774bd98771725f94c6af152e68b90c3f9566fc6bf7d66b48408f3fd7ab60af6c721f402d294ad80ae16c9c6266acff50e0ca6f1a2e3f53dc881849f21d3557e624d96aa415fbc6b089cb2a696478906cc12475548619700d3ffbe2c327bfc75313442f7f4e277ffc09ad6753b73a3b852194fdd72ef1fed85d80abcf31f57d97d56f125c5cffc46618cae210686e8c1828cd4eb2ade5607023027f0bb2bf428e16e73fc579e5eccb9019ee1cb", 0xd9}, {&(0x7f0000000f80)="b9379d1705b0b6d58a1f6ef4ee6048db45fe", 0x12}, {&(0x7f0000000fc0)="255abeb53404a1f9bad1a1c28d3494733b88e3b51d26d8fd944843a6c688bb44ebffd4aa7e57357cbf3a18a2eec10a6e318e438a482c3d478dfb4674095fa00aaa755e6fc2c3d21fe05d8abfd75659980ac8ac8748aab1dacbb8eceaf8dd06ad6a25ecc012784d5b97792b0a1a6669472067e5d10c5120aa0bd38352c2926a9a0232b54ffc43b3b8e91262ccb144a8b94265cda36b317da39479fa283bc6f2660d392bf4781661150b98", 0xaa}, {&(0x7f0000001080)="90a379c7c473cb2ed7df7c8135a92c643f67657027a9c083fc82eaa27d513aa324664808ead3d6905b454976565f580edf0613bfbec576974003134a66415a20b64cac18e5e61a8cdc4bd534d163e07c903a2a3f00c4a00f534d94615ede44150fad9c187430a1676c1195a8c4393e5ba39a853f0f8897b36309c998536c62b42368c658fdb3f319ad2f837f2e6fbe0032b87f2fdf9cb5aeda788b5b398992f58f91756fcbca82e73ec651709b97e6c094157863bbd673584d1085f010ceaec4d1eeb36bd4472e79b529df54846daaedb622fd684867a5a20720e96c3d09fc3b9b1a2cc3b6f69c0a6b", 0xe9}], 0x7, &(0x7f0000001200)=[@cred={{0x1c, 0x1, 0x2, {r48, r73, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r75, 0x0, r77}}}, @rights={{0x24, 0x1, 0x1, [r78, r71, r79, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r46, 0xee01, r82}}}], 0x88, 0x80}], 0x4, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@local, @in6=@mcast2, 0x4e24, 0x0, 0x4e24, 0x0, 0x2, 0x30, 0xc0, 0x33, r5, r10}, {0x38, 0xfffffffffffffffd, 0x6, 0x40, 0x1, 0x9, 0x2, 0x2}, {0x80, 0xfffffffffffffffc, 0x47, 0x4}, 0x2, 0x6e6bbb, 0x0, 0x0, 0x1, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x4, 0x2, 0x7, 0x7fffffff, 0x1f, 0x48b57bc7}}, 0xe8) [ 676.628384] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 676.635645] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 676.669379] ISOFS: Unable to identify CD-ROM format. 10:19:13 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 676.813399] hfsplus: unable to parse mount options [ 676.869816] hfsplus: gid requires an argument [ 676.890703] hfsplus: unable to parse mount options 10:19:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 676.979705] hfsplus: unable to parse mount options [ 677.049667] FAULT_INJECTION: forcing a failure. [ 677.049667] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 677.061561] CPU: 0 PID: 31782 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 677.069370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.078756] Call Trace: [ 677.081384] dump_stack+0x197/0x210 [ 677.085026] should_fail.cold+0xa/0x1b [ 677.088945] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 677.094065] ? debug_smp_processor_id+0x1c/0x20 [ 677.098783] ? perf_trace_lock+0xeb/0x510 [ 677.102945] ? mark_held_locks+0x100/0x100 [ 677.107201] __alloc_pages_nodemask+0x1ee/0x750 [ 677.112002] ? __alloc_pages_slowpath+0x2870/0x2870 [ 677.117035] ? find_held_lock+0x35/0x130 [ 677.121147] cache_grow_begin+0x91/0x8c0 [ 677.125218] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 677.130778] ? check_preemption_disabled+0x48/0x290 [ 677.135821] kmem_cache_alloc_trace+0x685/0x760 [ 677.140518] copy_mount_options+0x5c/0x3a0 [ 677.144790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 677.150835] ksys_mount+0xa7/0x150 [ 677.154510] __x64_sys_mount+0xbe/0x150 [ 677.158511] do_syscall_64+0xfd/0x620 [ 677.162510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.167709] RIP: 0033:0x45d35a [ 677.170932] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 677.195152] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 677.202873] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 677.210181] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 677.217568] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 677.224861] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 677.232143] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 677.289833] hfsplus: unable to parse mount options [ 677.321600] ISOFS: Unable to identify CD-ROM format. 10:19:13 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) socket$inet6_sctp(0xa, 0x5, 0x84) 10:19:13 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 677.503442] hfsplus: unable to parse mount options [ 677.550380] FAULT_INJECTION: forcing a failure. [ 677.550380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 677.576015] CPU: 0 PID: 31800 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 677.576842] hfsplus: gid requires an argument [ 677.583960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.583968] Call Trace: [ 677.583993] dump_stack+0x197/0x210 [ 677.584016] should_fail.cold+0xa/0x1b [ 677.584035] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 677.584056] ? __might_sleep+0x95/0x190 [ 677.584076] __alloc_pages_nodemask+0x1ee/0x750 [ 677.584090] ? check_preemption_disabled+0x48/0x290 [ 677.584110] ? __alloc_pages_slowpath+0x2870/0x2870 [ 677.584129] ? rcu_read_lock_sched_held+0x110/0x130 [ 677.584143] ? __alloc_pages_nodemask+0x632/0x750 [ 677.584161] ? rcu_read_lock_sched_held+0x110/0x130 [ 677.615572] hfsplus: unable to parse mount options [ 677.617356] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 677.617374] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 677.617393] alloc_pages_current+0x107/0x210 [ 677.617413] get_zeroed_page+0x14/0x50 [ 677.671609] selinux_sb_copy_data+0x2a/0x4a0 [ 677.676046] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 677.681605] security_sb_copy_data+0x6b/0xb0 [ 677.686250] mount_fs+0x230/0x31f [ 677.689723] vfs_kern_mount.part.0+0x6f/0x410 [ 677.694244] do_mount+0x53e/0x2bc0 10:19:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_gettime(r1, 0x0) timer_gettime(r1, &(0x7f00000001c0)) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/228) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r2 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r2, &(0x7f0000000100)=0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000002c0)={0xa096, 0x8001, 0x6, 0x6, 0x6, 0x2, 0x4, 0xcab6}, &(0x7f0000000300)={0x6, 0x7, 0xff, 0x1, 0xc5, 0x1000, 0xffffffff, 0x80000000}, &(0x7f0000000340)={0x7, 0x9, 0x4, 0x5, 0x4, 0x0, 0x9e, 0x40}, &(0x7f00000003c0)={r3, r4+30000000}, &(0x7f00000004c0)={&(0x7f0000000480)={0x8}, 0x8}) r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xdce, 0x202000) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="b764080000000000000074720100fefc0010", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000240)={r8, 0x2}, &(0x7f0000000280)=0x8) prctl$PR_SET_PTRACER(0x59616d61, r2) [ 677.697801] ? copy_mount_string+0x40/0x40 [ 677.702065] ? copy_mount_options+0x1f8/0x3a0 [ 677.706586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.712155] ? copy_mount_options+0x280/0x3a0 [ 677.716679] ksys_mount+0xdb/0x150 [ 677.720242] __x64_sys_mount+0xbe/0x150 [ 677.724244] do_syscall_64+0xfd/0x620 [ 677.728162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.733454] RIP: 0033:0x45d35a [ 677.736655] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 677.755761] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 677.763488] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 677.770771] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 677.778070] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 677.785362] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 677.792660] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = open(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000340)) geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) lsetxattr$security_ima(&(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000500)=@ng={0x4, 0xf, "bfcab94107230bdda0de062c25f9dbf1a37f1e"}, 0x15, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000940)={0x4, &(0x7f0000000900)=[{0x7fff, 0x31, 0xa, 0xfffffeff}, {0x8000, 0x80, 0xff, 0xb8b8}, {0x7, 0x40, 0x1b, 0x8}, {0x80, 0x81, 0x3f, 0xfffffe00}]}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x4582b64ceb5eb42a, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20000180}, 0xc, &(0x7f0000000880)={&(0x7f00000006c0)={0x1b4, r5, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x144}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ffb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x30}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x65}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4000}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x56}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_PROP={0xfffffffffffffdbd, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2a5df0c3}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8c8c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ba}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x5040}, 0x400) close(r3) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) read$usbmon(r4, &(0x7f0000000540)=""/143, 0x8f) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r7 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r7, 0x4, &(0x7f00000001c0)=""/247) ftruncate(r6, 0x200004) sendfile(r3, r6, 0x0, 0x80001d00c0d0) write$cgroup_type(r6, &(0x7f0000000040)='threaded\x00', 0x9) 10:19:14 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 678.049300] FAULT_INJECTION: forcing a failure. [ 678.049300] name failslab, interval 1, probability 0, space 0, times 0 [ 678.102582] CPU: 0 PID: 31817 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 678.110458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.120007] Call Trace: [ 678.122619] dump_stack+0x197/0x210 [ 678.126303] should_fail.cold+0xa/0x1b [ 678.130244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 678.135389] ? lock_downgrade+0x880/0x880 [ 678.139601] ? ns_test_super+0x50/0x50 [ 678.143524] __should_failslab+0x121/0x190 [ 678.147795] should_failslab+0x9/0x14 [ 678.151755] kmem_cache_alloc_trace+0x2cc/0x760 [ 678.156454] ? do_raw_spin_unlock+0x178/0x270 [ 678.160994] ? ns_test_super+0x50/0x50 [ 678.164896] sget_userns+0x11b/0xd30 [ 678.168624] ? ns_test_super+0x50/0x50 [ 678.172522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.178444] ? set_bdev_super+0x120/0x120 [ 678.182603] ? set_bdev_super+0x120/0x120 [ 678.186769] ? ns_test_super+0x50/0x50 [ 678.190663] sget+0x10c/0x150 [ 678.193795] mount_bdev+0xff/0x3c0 [ 678.201814] ? isofs_bread+0xe0/0xe0 [ 678.205557] isofs_mount+0x35/0x40 [ 678.209375] mount_fs+0xa8/0x31f [ 678.212764] vfs_kern_mount.part.0+0x6f/0x410 [ 678.217537] do_mount+0x53e/0x2bc0 [ 678.221093] ? copy_mount_string+0x40/0x40 [ 678.225430] ? _copy_from_user+0xdd/0x150 [ 678.229594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.235140] ? copy_mount_options+0x280/0x3a0 [ 678.239647] ksys_mount+0xdb/0x150 [ 678.243199] __x64_sys_mount+0xbe/0x150 [ 678.247186] do_syscall_64+0xfd/0x620 [ 678.251089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.256288] RIP: 0033:0x45d35a [ 678.259596] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 678.278527] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 678.286270] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 678.293643] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 678.300936] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 678.308215] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 678.315494] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:14 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) 10:19:14 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 678.556547] FAULT_INJECTION: forcing a failure. [ 678.556547] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 678.570802] CPU: 1 PID: 31827 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 678.579175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.588630] Call Trace: [ 678.591255] dump_stack+0x197/0x210 [ 678.595000] should_fail.cold+0xa/0x1b [ 678.599017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 678.604157] ? __might_sleep+0x95/0x190 [ 678.608173] __alloc_pages_nodemask+0x1ee/0x750 [ 678.612872] ? check_preemption_disabled+0x48/0x290 [ 678.617915] ? __alloc_pages_slowpath+0x2870/0x2870 [ 678.622958] ? rcu_read_lock_sched_held+0x110/0x130 [ 678.627989] ? __alloc_pages_nodemask+0x632/0x750 [ 678.632877] ? rcu_read_lock_sched_held+0x110/0x130 [ 678.637918] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 678.643486] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 678.649057] alloc_pages_current+0x107/0x210 [ 678.653495] get_zeroed_page+0x14/0x50 [ 678.657403] selinux_sb_copy_data+0x2a/0x4a0 [ 678.661856] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 678.667551] security_sb_copy_data+0x6b/0xb0 [ 678.667569] mount_fs+0x230/0x31f [ 678.675542] vfs_kern_mount.part.0+0x6f/0x410 [ 678.680074] do_mount+0x53e/0x2bc0 [ 678.680097] ? copy_mount_string+0x40/0x40 [ 678.680122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.680135] ? copy_mount_options+0x280/0x3a0 [ 678.680156] ksys_mount+0xdb/0x150 [ 678.701770] __x64_sys_mount+0xbe/0x150 [ 678.705786] do_syscall_64+0xfd/0x620 [ 678.709610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.714910] RIP: 0033:0x45d35a [ 678.718114] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 678.737041] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 678.744771] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a 10:19:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xffffffd3, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x1e}, 0x2000003}]}, &(0x7f0000000180)=0x10) 10:19:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:15 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x402181, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000140)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x12, 0x6, 0x7}, 0x2c) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x292940, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r2, 0x3b71, &(0x7f00000000c0)={0x20, 0x2, 0x26, 0x1, 0x3}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @multicast2}], 0x10) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 678.752065] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 678.759364] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 678.766684] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 678.773978] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x8, &(0x7f00000014c0)=[{&(0x7f00000001c0)="ebd852793a6c0c805d130665879b58d3df3836b006ef82b9c8519ed9fe7d647b5a36c21e2ece9e1fa1709d7e16c591e5cf8c82a14075a7b970bdcf768ddbf35c6f7d694f5784d7458e3dd14917cd01a7138c17eded8298043dd04a7b219c3047c5d0aee22975325895f84b8e62a1ba5f00b39c5d1639e8b5b8dcf959055e54227bddd57023744245d2fdfa0dd86a1fee509f9231c6895ef9091cef8e5f6567f81ba11a904cbd745e495023195c877ee472be04841379", 0xb6, 0x8}, {&(0x7f0000000280)="7cb997abef2dd64ae2936c5237f1cbd1e9bb1b5d7913f8ed3558abbeba743341ca0ab0f6a3e9b9cb2b39d613eac8583f4d62a7d3c9f01606f5ec601c7b32f687d59fed2e97f65352331d04", 0x4b, 0x7fff}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000080)="34dcb3f9996874f6048dbf582484f4c6ef5f", 0x12, 0x100000001}, {&(0x7f0000000100)="68a3f0f81ef8b0d0d5f83e141622b0f3341a65b4e16d9d89b37b8201e97d6e0d60e2377cb4d78e84fefca61c5b66f316", 0x30, 0x1ff}, {&(0x7f0000001300)="e9bff1074b61071492843d827e9d808b23b57e59e289f6e7b9d7ba3a2fa937e5f0b9eba3b1c29efb47f8", 0x2a, 0x3}, {&(0x7f0000001340)="b1fd239dbd99af39dae024f6874006b6531a1651352ab29f9ea7c25fc837e7b0637ac4b9f948f135155b30f8c00c91a7c238ff23d21296e40157d7c6f7d291c2d9f9a2e2a3365ee015a28484f992cafbd3b59b252cc3819ef675eec393eec5db00d97688bf3992d75dcda3941bfc9abe6a30ed109e9ad82d5ba8f01053abce37c72d04c375febadc36f8bbaee492279b51f1239b", 0x94, 0x9}, {&(0x7f0000001400)="62db4043998caf426c2af92a83ed605295f8054540cdc65f05d33e9c4e924197e36f36216a412ffddcfdc89810b357856f4e99e2c58828a8e98cd5e1b70914007374a1f81caf04fd69a6e9a80a9e2e30d21b1581b443d0b52026228ef6a82b8304dde5cf51c03d99d2fc3adcbb1e7a39c77788c8a0aea997a8b2cbf5be61831dff6bbfa775b897092d479852fed51753d8dae65c3fbb840c183c36e05d5ec3", 0x9f, 0x3}], 0x80, &(0x7f0000001640)=ANY=[@ANYBLOB="6d6f64653d30783030303030303030303030303030300b927aaf42312302874a302c6d61703d6f1ac316ec6e652ed9dd574ec566662c736d000f3e899331e471c68c622347334b3a7e01000000003d070000000000000074242c646f6e745f6d656173757265fd6d29f6dd1a298aec2c63723d30303030303030303030303030303030303031392c7375626a5f726f6c653d626465766367726f75707365637572697400"]) 10:19:15 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x5) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) ioctl(0xffffffffffffffff, 0xa89b, &(0x7f00000000c0)="2162ea0b2fac2741f1dbf62c16b9fa0dc802f76d62ecc5b9e22f0fd3fdb4f10fd753e28fd9f69d952b66da5104cf633b57fca810dd3ba81afd1e7c9c3925b77a2c0974d21e54b736ea659003a60a20998b8022507f84252a70f2bd68a1831c5378fc3144411c056be14b1f05133872ac9a") [ 678.984848] kauditd_printk_skb: 24 callbacks suppressed [ 678.984870] audit: type=1800 audit(1576318755.265:564): pid=31837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=40 res=0 10:19:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 679.083878] audit: type=1804 audit(1576318755.295:565): pid=31837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/923/file0/file0" dev="loop1" ino=40 res=1 [ 679.120391] audit: type=1800 audit(1576318755.295:566): pid=31837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=40 res=0 [ 679.162050] FAULT_INJECTION: forcing a failure. [ 679.162050] name failslab, interval 1, probability 0, space 0, times 0 [ 679.186584] CPU: 0 PID: 31850 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 679.194610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.203997] Call Trace: [ 679.204026] dump_stack+0x197/0x210 [ 679.204047] should_fail.cold+0xa/0x1b [ 679.204066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 679.204083] ? lock_downgrade+0x880/0x880 [ 679.204106] __should_failslab+0x121/0x190 [ 679.204121] should_failslab+0x9/0x14 [ 679.204134] kmem_cache_alloc+0x2ae/0x700 [ 679.204152] ? trace_hardirqs_on+0x67/0x220 [ 679.219390] getname_kernel+0x53/0x370 [ 679.244353] kern_path+0x20/0x40 [ 679.247777] lookup_bdev.part.0+0x7b/0x1b0 [ 679.252033] ? blkdev_open+0x290/0x290 [ 679.255941] ? __free_pages+0x72/0xb0 [ 679.259762] blkdev_get_by_path+0x81/0x130 [ 679.264021] mount_bdev+0x5d/0x3c0 [ 679.267581] ? isofs_bread+0xe0/0xe0 [ 679.271349] isofs_mount+0x35/0x40 [ 679.274909] mount_fs+0xa8/0x31f [ 679.278290] vfs_kern_mount.part.0+0x6f/0x410 [ 679.282826] do_mount+0x53e/0x2bc0 [ 679.286406] ? copy_mount_string+0x40/0x40 [ 679.290663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.296224] ? copy_mount_options+0x280/0x3a0 [ 679.300736] ksys_mount+0xdb/0x150 [ 679.304288] __x64_sys_mount+0xbe/0x150 [ 679.308288] do_syscall_64+0xfd/0x620 [ 679.312103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.317313] RIP: 0033:0x45d35a [ 679.320513] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 679.339433] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 679.347159] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 679.354528] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 679.361829] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 679.369120] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 679.376403] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:15 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) creat(&(0x7f0000000280)='./file0\x00', 0x0) 10:19:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000000c0)=@l2={0x1f, 0xfff8, {0x1, 0x3f, 0x9, 0x8, 0x7, 0x4}, 0x3, 0x7f}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="915cf5c3c2defa199a38f4511b8262485fe26aef458462211033bc8956c49511b81d3863d42f063e85b323bd", 0x2c}], 0x1}}, {{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="f0addd2a12cabeec1e70e74a54b7dcbea7c38fe82d216953792435f7a577d4f6de8387787392bc4091f1f02f6120dcd738c213804c4ee78a56dc76c69840fb30d32349d9b7d42171a956a32d270c308b4cebec495137ffb3af7bc35a71345fa11be79ba9317b3ae22180c4", 0x6b}, {&(0x7f0000001200)}, {&(0x7f0000001240)="5fe2987fbfafc3515eb22b7fb8e59081de2649c8aaf8462faf10425137acaabbb303283ff7ac4192523da325e058a753072319200fc664db18bc3f6260d997f92eb50a2bdfda0214b6f08d504fd16ff80621b10850652f42c5e9943edde80ba4f5962291bb2a365e89574178dcc10d4a298fc82b613089fe7c786be9f3cc5d9bca919c32f4e97a12bea3c90a84fa68d5851861c38b9445cabfe9ba03e05840424f79836fa828647bcff4869189a660a0d03a3c509365bf35df9c66969696bf72c512b17e61e9c3c48460e8e2", 0xcc}, {&(0x7f0000001340)="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", 0x1000}], 0x5, &(0x7f00000023c0)=[{0x70, 0x103, 0xdb7, "63e6159ab7e2008d33efa9d4f91dd34e9a94ba01fc56da9a4df2fc41b03092e60b57d0f80008e709471727f9001ed3d13dcb15c3652586a834fc4be1dd6d13458dffd51ac51232a33ea50949363da1a1ef8910982252a6d04b9f0769"}, {0x10, 0x203, 0x3}, {0x48, 0x88, 0x0, "8db159743e4d598b903d8043ad0b668b26b52c92808666f177af733e3f7fc75cbefd3fdb71bf9a670bdf89ba661bb0a19cbf"}, {0x58, 0x101, 0xca8, "042f88f816bd276de537b0059883592d1bcf327b9f7978f2869bf8ade0851c88ec2b9ef437c06a662eaaba78449415ba8bff693a01f4e5123f5efc6cf274917a273bc386"}, {0x70, 0x614a65bd57771378, 0x3ff, "7d28fcc52e4e5690bc05585a5bd70b54974c8265cfa97494b0facede66b6020b6673b68148d2b20a680197b367395ef960fb684e82828ef6e786da7a59e0956f65d9d3459777dcc816d119398a67b88314e194009a756699bc2d06"}, {0xb0, 0x110, 0x0, "c550da10d3a802d5023764861fcdb050ad27991a54c43e5909129acca4100d844043ce08a9565574ba35edd0a59fecf031c78a8fe559e40ea20dbcb739e99f476f54023bf8a0bd069115f37fee53d0496885823f3b1347d790d21ebe192479a94d42b216c059929f10c87f6bb82fb48371369a191904ceddf6bf1fc4f18743e3244b33f8c990bb2f6e1e6b9c8feca8089ec2190429ac53362d368effb5ffea6c"}, {0x1010, 0x112, 0x2, "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"}], 0x1250}}, {{0x0, 0x0, &(0x7f0000003640), 0x0, &(0x7f0000003680)=[{0x28, 0x101, 0x0, "4646dd8d2ed7fc094286f2bb260d88a525f18e12413181"}, {0x20, 0x101, 0x7, "893b6fc134c0a64aa60a73c22e90a850"}, {0xd0, 0x115, 0x6, "1ff67a2f79e6a4127657bcd995169d622db1cd5f9141e82e4c77545bfeacf297cd8265883dc875e82c9f4154d00f00f928cb746ec8494fef3cb1389e39dffed801419ab89c217f1cee666883b6ce29eb342a9c79c8b2ad4f4e5aca133fefd203f96fae7afe0da61555ec8b3519892d2d1e3af82dd3719beed94628c2094043aa9875b531484822074a111f0c9395300d14924b32e408c561691699980a74c23f29046d3071b680a07a2cf585332f5f53d1427817743765fe469d5d"}], 0x118}}], 0x3, 0x2000005b) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000001200)=0x4) 10:19:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:15 executing program 5: socket$inet6_sctp(0xa, 0x801, 0x84) r0 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2, @local, 0x3}]}, &(0x7f0000000000)=0xb) 10:19:15 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 679.484005] audit: type=1800 audit(1576318755.765:567): pid=31859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=41 res=0 10:19:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x35ebe2ca3a3dc47e, 0x0, 0x0, 0xa2, 0x0, 0x20000000}, 0x20) [ 679.605636] audit: type=1804 audit(1576318755.785:568): pid=31859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/924/file0/file0" dev="loop1" ino=41 res=1 [ 679.697859] audit: type=1800 audit(1576318755.785:569): pid=31859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=41 res=0 [ 679.729735] FAULT_INJECTION: forcing a failure. [ 679.729735] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:19:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r3, 0xfffffffffffffcfe, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r6, 0xda, "47f8a39db9dbd7e7dc46ce6bbe238a75e5d28d53bb3b86438b316f37d29968279348e68e12a0df7eccfbd8ef614dc34c8a3aee49e2fe1b110203680fd138b9c49bc5e14dd814ffcc3adfd257ab568158a689f662491b8a1afd05cb5a205595983164a040ace408879b057fb260d73379585cc20a5d2942a201dd1f3e3f0356a79bc1f3cf0d8359c64fbbc75b7764afaec6d95761935efbaebeae792f7912569c40e51b0a7753f78947efa648054cbb77a8cc286e6af6877b2bc3001c2d0ae1f13fa1f687a9ba3c6f0ba8437e5d6cecf29b418e08f2621de5a020"}, &(0x7f0000000080)=0xe2) [ 679.741618] CPU: 0 PID: 31873 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 679.749515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.759546] Call Trace: [ 679.762166] dump_stack+0x197/0x210 [ 679.765866] should_fail.cold+0xa/0x1b [ 679.769851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 679.774991] ? debug_smp_processor_id+0x1c/0x20 [ 679.779691] ? perf_trace_lock+0xeb/0x510 [ 679.783864] ? mark_held_locks+0x100/0x100 [ 679.788119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.793675] __alloc_pages_nodemask+0x1ee/0x750 [ 679.793692] ? debug_smp_processor_id+0x1c/0x20 [ 679.793708] ? perf_trace_lock+0xeb/0x510 [ 679.793728] ? __alloc_pages_slowpath+0x2870/0x2870 [ 679.793743] ? find_held_lock+0x35/0x130 [ 679.793771] cache_grow_begin+0x91/0x8c0 [ 679.793785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.793803] ? check_preemption_disabled+0x48/0x290 [ 679.793821] kmem_cache_alloc+0x63b/0x700 [ 679.793840] ? trace_hardirqs_on+0x67/0x220 [ 679.812526] getname_kernel+0x53/0x370 [ 679.812545] kern_path+0x20/0x40 10:19:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 679.812562] lookup_bdev.part.0+0x7b/0x1b0 [ 679.812577] ? blkdev_open+0x290/0x290 [ 679.855341] ? __free_pages+0x72/0xb0 [ 679.859170] blkdev_get_by_path+0x81/0x130 [ 679.863417] mount_bdev+0x5d/0x3c0 [ 679.866968] ? isofs_bread+0xe0/0xe0 [ 679.866990] isofs_mount+0x35/0x40 [ 679.867007] mount_fs+0xa8/0x31f [ 679.867031] vfs_kern_mount.part.0+0x6f/0x410 [ 679.867048] do_mount+0x53e/0x2bc0 [ 679.885718] ? retint_kernel+0x2d/0x2d [ 679.889648] ? copy_mount_string+0x40/0x40 10:19:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 679.891540] audit: type=1800 audit(1576318756.165:570): pid=31881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=42 res=0 [ 679.893911] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 679.893929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.893945] ? copy_mount_options+0x280/0x3a0 [ 679.893962] ksys_mount+0xdb/0x150 [ 679.936001] __x64_sys_mount+0xbe/0x150 [ 679.940012] do_syscall_64+0xfd/0x620 [ 679.944106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.949567] RIP: 0033:0x45d35a [ 679.949583] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 679.949592] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 679.949606] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 679.949616] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 10:19:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 679.949625] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 679.949634] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 679.949643] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 679.994404] audit: type=1804 audit(1576318756.205:571): pid=31881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/925/file0/file0" dev="loop1" ino=42 res=1 [ 680.098219] ISOFS: Unable to identify CD-ROM format. [ 680.217051] audit: type=1800 audit(1576318756.205:572): pid=31881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=42 res=0 [ 680.317173] audit: type=1400 audit(1576318756.255:573): avc: denied { map } for pid=31888 comm="syz-executor.4" path="/dev/nullb0" dev="devtmpfs" ino=17190 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 10:19:16 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)={r5, 0xaa, "08cd3fbe64058fc7bb27348cff2833872dfa22ac78b548bf4c6b0cfa8c6c24cc61de224963952ea9bdc7e734bf7600a99bad4473df38f534b919c3e7b359b4b89656de1c0630f720cbd8be1cde18534a29bede3c50e8a521b47cb30edcd83e1623d1208020e523cf4c6c22cd1f33bd38413057150ecfac0b4ae23284c7ebff7f374661eb866990383ad49324530b789f455db79fceca6e29386f1b5ade86d7663b48a38476f35ee4dcdb"}, &(0x7f0000000440)=0xb2) 10:19:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:16 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 680.442774] FAULT_INJECTION: forcing a failure. [ 680.442774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 680.454648] CPU: 0 PID: 31898 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 680.454660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.454666] Call Trace: [ 680.454690] dump_stack+0x197/0x210 [ 680.454714] should_fail.cold+0xa/0x1b [ 680.454732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 680.454749] ? debug_smp_processor_id+0x1c/0x20 [ 680.454765] ? perf_trace_lock+0xeb/0x510 [ 680.454778] ? mark_held_locks+0x100/0x100 [ 680.454792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.454816] __alloc_pages_nodemask+0x1ee/0x750 [ 680.507294] ? debug_smp_processor_id+0x1c/0x20 [ 680.516727] ? perf_trace_lock+0xeb/0x510 [ 680.520922] ? __alloc_pages_slowpath+0x2870/0x2870 [ 680.520939] ? find_held_lock+0x35/0x130 [ 680.520969] cache_grow_begin+0x91/0x8c0 [ 680.520984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.521000] ? check_preemption_disabled+0x48/0x290 [ 680.521017] kmem_cache_alloc+0x63b/0x700 [ 680.521033] ? trace_hardirqs_on+0x67/0x220 [ 680.521054] getname_kernel+0x53/0x370 [ 680.521068] kern_path+0x20/0x40 [ 680.521089] lookup_bdev.part.0+0x7b/0x1b0 [ 680.530221] ? blkdev_open+0x290/0x290 [ 680.569348] ? __free_pages+0x72/0xb0 [ 680.569372] blkdev_get_by_path+0x81/0x130 [ 680.569390] mount_bdev+0x5d/0x3c0 [ 680.569406] ? isofs_bread+0xe0/0xe0 [ 680.569424] isofs_mount+0x35/0x40 [ 680.588908] mount_fs+0xa8/0x31f [ 680.592420] vfs_kern_mount.part.0+0x6f/0x410 [ 680.592441] do_mount+0x53e/0x2bc0 [ 680.592463] ? copy_mount_string+0x40/0x40 [ 680.592480] ? _copy_from_user+0xdd/0x150 [ 680.592500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.592511] ? copy_mount_options+0x280/0x3a0 [ 680.592528] ksys_mount+0xdb/0x150 [ 680.592544] __x64_sys_mount+0xbe/0x150 [ 680.592564] do_syscall_64+0xfd/0x620 [ 680.592583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.639103] RIP: 0033:0x45d35a 10:19:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 680.642348] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 680.661277] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 680.669012] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 680.676334] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 680.683740] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 680.691217] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 680.698510] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r4, 0x1, 0x6}, &(0x7f0000000040)=0xfffffffffffffdcf) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = getegid() syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000480)="d4328859ad12ed05ae7fa50716567a3a8144f72e6028f5a147677f7bf538e70cca55f16b3c4656ef5cb1f6cdfeda9e56b048c2088fe8fc66b57f2b56a95ac8559c1723f5540485b5fc7d1050c7139e94c591d70eaac77787c62fe9bbaa3a066d565e7a23a028b0c3ce55844ebb7a39560b8e8defb79d5bd8ff597e816f6d11e14d8b749e12518a8b33a9d72ebb66152a8c60f6490d3c59062de6929fd7d88c2a3f323c34f69d658ce29c9907d64f32921cc4dae5c8", 0xb5, 0x81}, {&(0x7f00000006c0)="6b5ab1333869a9180a3dd4055fadb9fcf52d471b87a7bd371ef77c2f39e2c7ab420d17a9e89927a8d0f669432e9ade00e85cb271fda7a324d1cf4b09c0b6273b98e7d5a53856e8c219d8f45bc24e5a64c992dee34d92354c6d172a1d79005ed31ecb3c7e205779d01f6997fd96de30105eee1bc4f71de9b1e0c8da5986e3b8ec8794c09588b5fa8a4dcf4dd02e133d2f60f2476824a8be1422bcce6fefe3a7bf92eaaba2ff936a3fc8d7acb88caa4055e66a7b3bdeec5a4807beab3bb66342affd3d49892606fc71972e16f96a93098d7c68dc10d6ec9195369e8e2b05fe0b76caf3f4556cc2c39cd8cd8bedc6cda0", 0xef, 0x4}, {&(0x7f00000007c0)="99133a4664289cfc0e129d45f92d94b48ebc72f7c57cf8a22403b7674993e8bec6c7ade473406f5dd541eaebce7fb0b2288de699341489911acd0a74cc4699a18673fd2304adf445874becd622f9ee22614cdd560d64e453b12681936dffafd9a410adf2f7e4295f2797cbb67abc92d5cff342315fa9ff21337fb4b60dffed52d834395e67305194c33aa638eda44f173782caebe514a97decc2f4c6b72db287b02ec9b0029ed0375356e43425d0c2d2baac1ad13b7376063922f9142fa3d060bc60e10f3e2b3382e22862b1c06ca61a32b0376470a108b43ee105ae860b91b6eef8d74cae425013edd1e2187f00052bf1174a321c9e", 0xf6, 0xe04}, {&(0x7f0000000240)="8a3a249ffc75a87108a60a4cbec821141e4ad7099be9", 0x16, 0x27}, {&(0x7f00000002c0)="4b52e995725043fe670f35e405f2be31fa0f5052e18d4b6f2ac4ea6b76", 0x1d, 0x7}, {&(0x7f0000000540)="147fc6b4606aa6f74aa7097a8f3eec00dfbf9eb4cb94b9de099bfcdfb704a8cdba51a61e8f421c8033c7a56959f2ae4d81f75792e35c1dc513d20263500deeeabf60998cc7cd758dcc60f59815fba92ba2a296cb3095ab9759aaea4bf33b085116f4a6cbd0b884aac96bf0849a49ca06bd0bc5ed2a9c1de8c3187262f71e28c345efb574d5d957ee36924ffa4a30dbca780dd409", 0x94, 0xc115}], 0x3023880, &(0x7f0000000340)={[{@gid={'gid', 0x3d, r6}}], [{@seclabel='seclabel'}, {@smackfstransmute={'smackfstransmute'}}]}) dup(r5) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:17 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:17 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 681.061280] ISOFS: Unable to identify CD-ROM format. [ 681.261773] syz-executor.4 (31889) used greatest stack depth: 21216 bytes left 10:19:17 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:17 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2", 0x80) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:17 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 10:19:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) io_setup(0x6, &(0x7f0000000140)=0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x380102, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid', 0x3d, r5}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = getpid() r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(r6, &(0x7f0000004600)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r7, r9}}}], 0x20}], 0x1, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0xffffffffffffffff, r11) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x4002002, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',blksize=0x0000000000000800,allow_other,max_read=0x0000000000000401,allow_other,max_read=0x0000000100000000,smackfsdef=veth0\x00,euid<', @ANYRESDEC=r9, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB=',obj_type=vboxnet0Kprocvboxnet0bdevem1}&]vmnet0vmnet1mime_type[em1ppp0,measure,defcontext=sysadm_u,uid>', @ANYRESDEC=r11, @ANYBLOB=',obj_type=}-,\x00']) io_submit(r2, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000040)={'veth0\x00', 0x3}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 681.588072] FAULT_INJECTION: forcing a failure. [ 681.588072] name failslab, interval 1, probability 0, space 0, times 0 [ 681.604916] hfsplus: gid requires an argument [ 681.629682] hfsplus: unable to parse mount options [ 681.638088] CPU: 1 PID: 31937 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 681.646027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.655399] Call Trace: [ 681.658011] dump_stack+0x197/0x210 [ 681.662184] should_fail.cold+0xa/0x1b [ 681.666087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 681.671210] ? lock_downgrade+0x880/0x880 [ 681.675742] __should_failslab+0x121/0x190 [ 681.679992] should_failslab+0x9/0x14 [ 681.683823] __kmalloc+0x2e2/0x750 [ 681.687384] ? __list_lru_init+0xd5/0x720 [ 681.691563] __list_lru_init+0xd5/0x720 [ 681.695556] sget_userns+0x81b/0xd30 [ 681.699287] ? ns_test_super+0x50/0x50 [ 681.703188] ? set_bdev_super+0x120/0x120 [ 681.707455] ? set_bdev_super+0x120/0x120 [ 681.711647] ? ns_test_super+0x50/0x50 [ 681.716353] sget+0x10c/0x150 [ 681.719490] mount_bdev+0xff/0x3c0 [ 681.723411] ? isofs_bread+0xe0/0xe0 [ 681.727328] isofs_mount+0x35/0x40 [ 681.730917] mount_fs+0xa8/0x31f [ 681.734313] vfs_kern_mount.part.0+0x6f/0x410 [ 681.738842] do_mount+0x53e/0x2bc0 [ 681.742418] ? copy_mount_string+0x40/0x40 [ 681.747798] ? _copy_from_user+0xdd/0x150 [ 681.751961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.757522] ? copy_mount_options+0x280/0x3a0 [ 681.762032] ksys_mount+0xdb/0x150 [ 681.765695] __x64_sys_mount+0xbe/0x150 [ 681.769709] do_syscall_64+0xfd/0x620 [ 681.773528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.778723] RIP: 0033:0x45d35a [ 681.781930] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 681.800843] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 681.808562] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 681.815926] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 681.823205] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 681.830493] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 681.837941] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 682.022899] hfsplus: gid requires an argument [ 682.027465] hfsplus: unable to parse mount options 10:19:18 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 682.171557] FAULT_INJECTION: forcing a failure. [ 682.171557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.183524] CPU: 0 PID: 31963 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 682.183555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.183561] Call Trace: [ 682.183588] dump_stack+0x197/0x210 [ 682.183609] should_fail.cold+0xa/0x1b [ 682.183633] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 682.183649] ? debug_smp_processor_id+0x1c/0x20 [ 682.183666] ? perf_trace_lock+0xeb/0x510 [ 682.183683] ? mark_held_locks+0x100/0x100 [ 682.230025] ? avc_has_perm_noaudit+0x3b6/0x570 [ 682.230053] __alloc_pages_nodemask+0x1ee/0x750 [ 682.230077] ? __alloc_pages_slowpath+0x2870/0x2870 [ 682.230107] cache_grow_begin+0x91/0x8c0 [ 682.248525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.254079] ? check_preemption_disabled+0x48/0x290 [ 682.254104] kmem_cache_alloc_trace+0x685/0x760 [ 682.254131] ? ns_test_super+0x50/0x50 [ 682.254148] sget_userns+0x11b/0xd30 [ 682.254161] ? ns_test_super+0x50/0x50 [ 682.254177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.254193] ? set_bdev_super+0x120/0x120 [ 682.254207] ? set_bdev_super+0x120/0x120 [ 682.254219] ? ns_test_super+0x50/0x50 [ 682.254231] sget+0x10c/0x150 [ 682.254248] mount_bdev+0xff/0x3c0 [ 682.254267] ? isofs_bread+0xe0/0xe0 [ 682.280979] isofs_mount+0x35/0x40 [ 682.280998] mount_fs+0xa8/0x31f [ 682.281023] vfs_kern_mount.part.0+0x6f/0x410 [ 682.281040] do_mount+0x53e/0x2bc0 [ 682.281059] ? copy_mount_string+0x40/0x40 [ 682.281081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.281091] ? copy_mount_options+0x280/0x3a0 [ 682.281109] ksys_mount+0xdb/0x150 [ 682.281125] __x64_sys_mount+0xbe/0x150 [ 682.281149] do_syscall_64+0xfd/0x620 [ 682.281169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.281179] RIP: 0033:0x45d35a [ 682.281195] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 10:19:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 682.371663] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 682.379490] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 682.386784] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 682.394080] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 682.401403] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 682.408696] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:18 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) 10:19:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x1000, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x102, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f00000000c0)=0x5) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 682.529854] ISOFS: Unable to identify CD-ROM format. 10:19:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639ae", 0x40) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:18 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket(0x4, 0x1, 0xfe) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x4, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)={0x2, 0x0, [{0x80000019, 0x700, 0xd246, 0x7, 0xfffffff7}, {0xa0000001, 0x0, 0x5, 0x80000000, 0xc6a3}]}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 682.773484] FAULT_INJECTION: forcing a failure. [ 682.773484] name failslab, interval 1, probability 0, space 0, times 0 [ 682.841160] CPU: 1 PID: 31985 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 682.849112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.858508] Call Trace: [ 682.861130] dump_stack+0x197/0x210 [ 682.864790] should_fail.cold+0xa/0x1b [ 682.868701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 682.868725] ? lock_downgrade+0x880/0x880 [ 682.877991] ? ns_test_super+0x50/0x50 [ 682.881901] __should_failslab+0x121/0x190 [ 682.886161] should_failslab+0x9/0x14 [ 682.889993] kmem_cache_alloc_trace+0x2cc/0x760 [ 682.890016] ? do_raw_spin_unlock+0x178/0x270 [ 682.890035] ? ns_test_super+0x50/0x50 [ 682.890050] sget_userns+0x11b/0xd30 [ 682.907031] ? ns_test_super+0x50/0x50 [ 682.910947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.916515] ? set_bdev_super+0x120/0x120 [ 682.920720] ? set_bdev_super+0x120/0x120 [ 682.924890] ? ns_test_super+0x50/0x50 [ 682.928812] sget+0x10c/0x150 [ 682.931943] mount_bdev+0xff/0x3c0 [ 682.935514] ? isofs_bread+0xe0/0xe0 [ 682.939246] isofs_mount+0x35/0x40 [ 682.942799] mount_fs+0xa8/0x31f [ 682.946227] vfs_kern_mount.part.0+0x6f/0x410 [ 682.950755] do_mount+0x53e/0x2bc0 [ 682.954318] ? copy_mount_string+0x40/0x40 [ 682.958590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.964241] ? copy_mount_options+0x280/0x3a0 [ 682.968849] ksys_mount+0xdb/0x150 [ 682.972417] __x64_sys_mount+0xbe/0x150 [ 682.976504] do_syscall_64+0xfd/0x620 [ 682.980426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.985646] RIP: 0033:0x45d35a [ 682.988867] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 683.008227] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 683.015978] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 683.023279] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 683.030584] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 683.037897] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 683.045192] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x4, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$kcm(0x29, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:19 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:19 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) [ 683.323082] FAULT_INJECTION: forcing a failure. [ 683.323082] name failslab, interval 1, probability 0, space 0, times 0 [ 683.370356] CPU: 1 PID: 32009 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 683.378203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.387602] Call Trace: [ 683.390238] dump_stack+0x197/0x210 [ 683.393896] should_fail.cold+0xa/0x1b [ 683.397795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 683.402920] ? lock_downgrade+0x880/0x880 [ 683.407100] __should_failslab+0x121/0x190 [ 683.411360] should_failslab+0x9/0x14 [ 683.415187] kmem_cache_alloc_trace+0x2cc/0x760 [ 683.419887] ? kasan_unpoison_shadow+0x35/0x50 [ 683.424513] ? kasan_kmalloc+0xce/0xf0 [ 683.428434] __memcg_init_list_lru_node+0x8a/0x1e0 [ 683.433394] __list_lru_init+0x402/0x720 [ 683.437588] sget_userns+0x81b/0xd30 [ 683.441329] ? ns_test_super+0x50/0x50 [ 683.445247] ? set_bdev_super+0x120/0x120 [ 683.449429] ? set_bdev_super+0x120/0x120 [ 683.453595] ? ns_test_super+0x50/0x50 [ 683.457621] sget+0x10c/0x150 [ 683.460754] mount_bdev+0xff/0x3c0 [ 683.464848] ? isofs_bread+0xe0/0xe0 [ 683.468747] isofs_mount+0x35/0x40 [ 683.472587] mount_fs+0xa8/0x31f [ 683.475999] vfs_kern_mount.part.0+0x6f/0x410 [ 683.480687] do_mount+0x53e/0x2bc0 [ 683.484252] ? copy_mount_string+0x40/0x40 [ 683.484280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.494236] ? copy_mount_options+0x280/0x3a0 [ 683.498779] ksys_mount+0xdb/0x150 [ 683.502346] __x64_sys_mount+0xbe/0x150 [ 683.506346] do_syscall_64+0xfd/0x620 [ 683.510173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.515383] RIP: 0033:0x45d35a 10:19:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x180) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 683.515400] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 683.515408] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 683.515425] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 683.552700] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 683.552710] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 683.552719] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 683.552728] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@int=0xfffff000, 0x4) 10:19:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x80000000, @loopback, 0x2800}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x0, 0x7084, @dev={0xfe, 0x80, [], 0x18}, 0x7fffffff}], 0x48) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x208180, 0x0) r4 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) r5 = creat(0x0, 0x0) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x7600, 0x3, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r7 = dup2(r6, 0xffffffffffffffff) r8 = socket(0x10, 0x80002, 0x0) r9 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x800, 0x0) r10 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r10, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast2, 0x7ff}, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r11, &(0x7f0000000240)=0x202, 0x4000000000dc) r12 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r12, 0x800, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x10) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r12, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2000c040) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x22048002}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c080000f6711204ef187154eed7a959d30d1b2ed9c2b02f95e8adae7aec662a5b009ed0db5c50d882809f4f1f8e0438c27fe2d5554ffa4772de31978522724440643a9aa8ad267de89d0eb9980d741dfcb4c6f231a02646d019db5724f34a71940600000000000000d53ca288bc27766124ca67dfe871002724bca7a1cb87f9ee55169ec49b01a3e5fc555b3bfac86ccfa4e6395b19cf326ce41c0675411368e3d299df9b02381622f6aae29629a7a5ed849858f48e8048c76cb454dc668f65dbbc78584c4f65ea0b195f61161ab8c792a64ae46bbde8c87cd55d51fac09ef5e9dbc55599c856e7f8d9f3e11133c5106cb582a9614b426292d5f85341a8f83461a2a2c6cfc60c6259baedff35", @ANYRES16=r12, @ANYBLOB="88002dbd7000fcdbdf25020000000c00030000000000000000000c0005000200000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x6000081) r13 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r14 = dup2(r13, 0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r14, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8}) r15 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r16 = dup2(r15, 0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r16, 0xc0184900, &(0x7f0000000080)={0x20024e, 0x20000000209}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x90, r12, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10a}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xd83b}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r14}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r7}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x17a000000000}]}, 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x80800) r17 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r18 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r18, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)={r18}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xfffffffffffffd96, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="000027bd7000ffdbdf25020000000c0004001f000000000000000c00080002000000000000003c00070008000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080001d1", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r19], 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r12, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9c20}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x10) r20 = socket$inet6(0xa, 0x400000000001, 0x0) close(r20) r21 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r20, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r21, 0x200004) sendfile(r20, r21, 0x0, 0x80001d00c0d0) r22 = syz_open_dev$vcsu(&(0x7f0000000240)='/dev/vcsu#\x00', 0xfff, 0x2000) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x6c, r12, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r3}, {0x8}, {0x8}, {0x8, 0x1, r21}, {0x8, 0x1, r22}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x6c}}, 0x20000) ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f00000001c0)={0x14}) 10:19:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(0x0, 0x94004, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$FBIOPUT_CON2FBMAP(r1, 0x4610, &(0x7f0000000040)={0x20}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:20 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 684.034903] kauditd_printk_skb: 33 callbacks suppressed [ 684.034918] audit: type=1800 audit(1576318760.315:607): pid=32035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=53 res=0 [ 684.176805] audit: type=1804 audit(1576318760.345:608): pid=32035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/937/file0/file0" dev="loop1" ino=53 res=1 [ 684.214201] audit: type=1800 audit(1576318760.345:609): pid=32035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=53 res=0 [ 684.261453] FAULT_INJECTION: forcing a failure. [ 684.261453] name failslab, interval 1, probability 0, space 0, times 0 [ 684.292688] CPU: 0 PID: 32043 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 684.300575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.309945] Call Trace: [ 684.312557] dump_stack+0x197/0x210 [ 684.316229] should_fail.cold+0xa/0x1b [ 684.320149] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 684.325278] ? lock_downgrade+0x880/0x880 [ 684.329440] __should_failslab+0x121/0x190 [ 684.333781] should_failslab+0x9/0x14 [ 684.337715] kmem_cache_alloc_trace+0x2cc/0x760 [ 684.342409] ? kasan_unpoison_shadow+0x35/0x50 [ 684.347015] ? kasan_kmalloc+0xce/0xf0 [ 684.351024] __memcg_init_list_lru_node+0x8a/0x1e0 [ 684.355971] __list_lru_init+0x402/0x720 [ 684.360051] sget_userns+0x81b/0xd30 [ 684.363778] ? ns_test_super+0x50/0x50 [ 684.367712] ? set_bdev_super+0x120/0x120 [ 684.371887] ? set_bdev_super+0x120/0x120 [ 684.376130] ? ns_test_super+0x50/0x50 [ 684.380024] sget+0x10c/0x150 [ 684.383160] mount_bdev+0xff/0x3c0 [ 684.386715] ? isofs_bread+0xe0/0xe0 [ 684.390455] isofs_mount+0x35/0x40 [ 684.394007] mount_fs+0xa8/0x31f [ 684.397426] vfs_kern_mount.part.0+0x6f/0x410 [ 684.401937] do_mount+0x53e/0x2bc0 [ 684.405494] ? copy_mount_string+0x40/0x40 [ 684.409753] ? copy_mount_options+0x1fb/0x3a0 [ 684.414275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.419824] ? copy_mount_options+0x280/0x3a0 [ 684.424340] ksys_mount+0xdb/0x150 [ 684.427901] __x64_sys_mount+0xbe/0x150 [ 684.431891] do_syscall_64+0xfd/0x620 [ 684.435729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.440925] RIP: 0033:0x45d35a [ 684.444134] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 684.463152] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 684.470915] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 684.478200] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 684.485492] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 684.492842] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 684.500120] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:20 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) socket$inet6_sctp(0xa, 0x5, 0x84) 10:19:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) bind$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5", 0x20) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:20 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 684.607634] audit: type=1800 audit(1576318760.885:610): pid=32049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=54 res=0 10:19:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 684.700411] FAULT_INJECTION: forcing a failure. [ 684.700411] name failslab, interval 1, probability 0, space 0, times 0 [ 684.719630] audit: type=1804 audit(1576318760.915:611): pid=32049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/938/file0/file0" dev="loop1" ino=54 res=1 [ 684.747770] CPU: 0 PID: 32058 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 684.756050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.756056] Call Trace: [ 684.756080] dump_stack+0x197/0x210 [ 684.756104] should_fail.cold+0xa/0x1b [ 684.756125] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 684.756145] ? lock_downgrade+0x880/0x880 [ 684.756174] __should_failslab+0x121/0x190 [ 684.756192] should_failslab+0x9/0x14 [ 684.756206] __kmalloc+0x2e2/0x750 [ 684.756228] ? __list_lru_init+0xd5/0x720 [ 684.756248] __list_lru_init+0xd5/0x720 [ 684.756269] sget_userns+0x81b/0xd30 [ 684.756285] ? ns_test_super+0x50/0x50 [ 684.756305] ? set_bdev_super+0x120/0x120 [ 684.756322] ? set_bdev_super+0x120/0x120 [ 684.756336] ? ns_test_super+0x50/0x50 [ 684.756349] sget+0x10c/0x150 10:19:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4, @multicast2}]}, &(0x7f0000000180)=0x10) 10:19:21 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) 10:19:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0xfffffffffffffeed) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x28041, 0x22) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r1, 0x4122, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r4, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000340)={0x0, 0x1, 0x8001, 0x1399}) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$input_event(r5, &(0x7f0000000140)={{0x0, 0x7530}, 0x14, 0x130, 0x7}, 0x18) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x8400, 0x0) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f0000000240)) fstat(r1, &(0x7f0000000380)) 10:19:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 684.756368] mount_bdev+0xff/0x3c0 [ 684.756383] ? isofs_bread+0xe0/0xe0 [ 684.756404] isofs_mount+0x35/0x40 [ 684.756420] mount_fs+0xa8/0x31f [ 684.756444] vfs_kern_mount.part.0+0x6f/0x410 [ 684.756463] do_mount+0x53e/0x2bc0 [ 684.756485] ? copy_mount_string+0x40/0x40 [ 684.756508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.756522] ? copy_mount_options+0x280/0x3a0 [ 684.756541] ksys_mount+0xdb/0x150 [ 684.756559] __x64_sys_mount+0xbe/0x150 [ 684.756580] do_syscall_64+0xfd/0x620 [ 684.756600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.756613] RIP: 0033:0x45d35a [ 684.756628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 684.756637] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 684.756653] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 684.756663] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 10:19:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000), 0x20) 10:19:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 684.756673] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 684.756683] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 684.756693] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 684.833098] audit: type=1800 audit(1576318760.915:612): pid=32049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=54 res=0 [ 685.092545] audit: type=1800 audit(1576318761.375:613): pid=32081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16833 res=0 10:19:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(r0, &(0x7f0000004600)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}], 0x1, 0x10000) r3 = syz_open_dev$vcsu(&(0x7f00000003c0)='/dev/vcsu#\x00', 0xfffffffffffffbff, 0x40000) write$char_usb(r3, &(0x7f0000000400)="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", 0x1000) geteuid() getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffff496, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="1905ca2967457ec4", 0x8, 0x7fffffff}], 0x20009, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d61785f6469725f73697a655f6b623d3078303030303030303030303030303030332c6c617a7974696d652c61636c2c746573745f64756d6d795f656e6372797074696f6e2c6d61780000000063685f74696d653d3078303030303030303038303030303030312c6a6f75726e616c5f636865636b73756d2c736d61636b6673726f6f743d73797361646d5f752c0000000000000f54002c736d61636b6673726f6f743d2176626f786e6574302c657569643e", @ANYRESDEC=r2, @ANYBLOB="2c6d6561737572652c66736d616769633d3078303030303030303030303030303030362c636f6e746578743d73746166665f752c6170707261fd0a652c636f6e746578743d73797361646d5f752c646566636f6e746578743d726f6f742c00"]) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4(r4, &(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000015c0)=0x80, 0x1c0000) r5 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r5, 0x402c5639, &(0x7f0000001440)={0xfffffe01, 0x7, 0x2}) readv(0xffffffffffffffff, &(0x7f0000002600)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000380), 0x4) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_G_DV_TIMINGS(r8, 0xc0845658, &(0x7f0000002640)={0x0, @reserved}) prctl$PR_SET_FP_MODE(0x2d, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) [ 685.116362] audit: type=1804 audit(1576318761.375:614): pid=32081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/939/file0/file0" dev="sda1" ino=16833 res=1 [ 685.117175] FAULT_INJECTION: forcing a failure. [ 685.117175] name failslab, interval 1, probability 0, space 0, times 0 [ 685.144396] audit: type=1800 audit(1576318761.375:615): pid=32081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16833 res=0 10:19:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000), 0x20) [ 685.233934] CPU: 1 PID: 32071 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 685.241820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.251639] Call Trace: [ 685.254250] dump_stack+0x197/0x210 [ 685.257908] should_fail.cold+0xa/0x1b [ 685.261851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.261875] ? lock_downgrade+0x880/0x880 [ 685.261898] __should_failslab+0x121/0x190 [ 685.275950] should_failslab+0x9/0x14 [ 685.279787] kmem_cache_alloc_trace+0x2cc/0x760 [ 685.284490] ? kasan_unpoison_shadow+0x35/0x50 [ 685.289113] ? kasan_kmalloc+0xce/0xf0 [ 685.293199] __memcg_init_list_lru_node+0x8a/0x1e0 [ 685.293224] __list_lru_init+0x402/0x720 [ 685.293244] sget_userns+0x81b/0xd30 [ 685.293258] ? ns_test_super+0x50/0x50 [ 685.293275] ? set_bdev_super+0x120/0x120 [ 685.293290] ? set_bdev_super+0x120/0x120 [ 685.293306] ? ns_test_super+0x50/0x50 [ 685.306100] sget+0x10c/0x150 [ 685.306132] mount_bdev+0xff/0x3c0 [ 685.306148] ? isofs_bread+0xe0/0xe0 [ 685.306166] isofs_mount+0x35/0x40 [ 685.306182] mount_fs+0xa8/0x31f [ 685.348870] vfs_kern_mount.part.0+0x6f/0x410 [ 685.353742] do_mount+0x53e/0x2bc0 [ 685.357316] ? copy_mount_string+0x40/0x40 [ 685.362210] ? _copy_from_user+0xdd/0x150 [ 685.368829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.374384] ? copy_mount_options+0x280/0x3a0 [ 685.378901] ksys_mount+0xdb/0x150 [ 685.382754] __x64_sys_mount+0xbe/0x150 [ 685.386760] do_syscall_64+0xfd/0x620 [ 685.390937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.396137] RIP: 0033:0x45d35a [ 685.399349] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.418327] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 685.426067] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a 10:19:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x200, 0x404000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) [ 685.433496] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 685.441042] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 685.448338] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 685.455908] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:21 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x24, 0x0, 0x0) 10:19:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x28001, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0xaee, 0x7, 0x4, 0x0, 0x10, 0x7}) 10:19:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) [ 685.663161] audit: type=1800 audit(1576318761.945:616): pid=32099 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=55 res=0 [ 685.708913] FAULT_INJECTION: forcing a failure. [ 685.708913] name failslab, interval 1, probability 0, space 0, times 0 [ 685.720936] CPU: 1 PID: 32108 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 685.728766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.738137] Call Trace: [ 685.740874] dump_stack+0x197/0x210 [ 685.744547] should_fail.cold+0xa/0x1b [ 685.748479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.753616] ? lock_downgrade+0x880/0x880 [ 685.757809] __should_failslab+0x121/0x190 [ 685.762069] should_failslab+0x9/0x14 [ 685.765963] kmem_cache_alloc_trace+0x2cc/0x760 [ 685.765977] ? kasan_unpoison_shadow+0x35/0x50 [ 685.765991] ? kasan_kmalloc+0xce/0xf0 [ 685.766012] __memcg_init_list_lru_node+0x8a/0x1e0 [ 685.766031] __list_lru_init+0x402/0x720 [ 685.766048] sget_userns+0x81b/0xd30 [ 685.766062] ? ns_test_super+0x50/0x50 [ 685.766080] ? set_bdev_super+0x120/0x120 [ 685.766095] ? set_bdev_super+0x120/0x120 [ 685.766107] ? ns_test_super+0x50/0x50 10:19:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) socket$inet6(0xa, 0x400000000001, 0x0) 10:19:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x80000000, @loopback, 0x2800}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x0, 0x7084, @dev={0xfe, 0x80, [], 0x18}, 0x7fffffff}], 0x48) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x208180, 0x0) r4 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) r5 = creat(0x0, 0x0) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x7600, 0x3, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r7 = dup2(r6, 0xffffffffffffffff) r8 = socket(0x10, 0x80002, 0x0) r9 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x800, 0x0) r10 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r10, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast2, 0x7ff}, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r11, &(0x7f0000000240)=0x202, 0x4000000000dc) r12 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r12, 0x800, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x10) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r12, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2000c040) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x22048002}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c080000f6711204ef187154eed7a959d30d1b2ed9c2b02f95e8adae7aec662a5b009ed0db5c50d882809f4f1f8e0438c27fe2d5554ffa4772de31978522724440643a9aa8ad267de89d0eb9980d741dfcb4c6f231a02646d019db5724f34a71940600000000000000d53ca288bc27766124ca67dfe871002724bca7a1cb87f9ee55169ec49b01a3e5fc555b3bfac86ccfa4e6395b19cf326ce41c0675411368e3d299df9b02381622f6aae29629a7a5ed849858f48e8048c76cb454dc668f65dbbc78584c4f65ea0b195f61161ab8c792a64ae46bbde8c87cd55d51fac09ef5e9dbc55599c856e7f8d9f3e11133c5106cb582a9614b426292d5f85341a8f83461a2a2c6cfc60c6259baedff35", @ANYRES16=r12, @ANYBLOB="88002dbd7000fcdbdf25020000000c00030000000000000000000c0005000200000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x6000081) r13 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r14 = dup2(r13, 0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r14, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8}) r15 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r16 = dup2(r15, 0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r16, 0xc0184900, &(0x7f0000000080)={0x20024e, 0x20000000209}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x90, r12, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10a}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xd83b}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r14}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r7}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x17a000000000}]}, 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x80800) r17 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r18 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r18, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)={r18}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xfffffffffffffd96, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="000027bd7000ffdbdf25020000000c0004001f000000000000000c00080002000000000000003c00070008000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080001d1", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r19], 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r12, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9c20}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x10) r20 = socket$inet6(0xa, 0x400000000001, 0x0) close(r20) r21 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r20, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r21, 0x200004) sendfile(r20, r21, 0x0, 0x80001d00c0d0) r22 = syz_open_dev$vcsu(&(0x7f0000000240)='/dev/vcsu#\x00', 0xfff, 0x2000) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x6c, r12, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r3}, {0x8}, {0x8}, {0x8, 0x1, r21}, {0x8, 0x1, r22}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x6c}}, 0x20000) ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f00000001c0)={0x14}) [ 685.766119] sget+0x10c/0x150 [ 685.766138] mount_bdev+0xff/0x3c0 [ 685.800022] ? isofs_bread+0xe0/0xe0 [ 685.800043] isofs_mount+0x35/0x40 [ 685.800058] mount_fs+0xa8/0x31f [ 685.800079] vfs_kern_mount.part.0+0x6f/0x410 [ 685.800096] do_mount+0x53e/0x2bc0 [ 685.800118] ? copy_mount_string+0x40/0x40 [ 685.800137] ? _copy_from_user+0xdd/0x150 [ 685.800158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.800170] ? copy_mount_options+0x280/0x3a0 [ 685.800188] ksys_mount+0xdb/0x150 [ 685.800203] __x64_sys_mount+0xbe/0x150 [ 685.800220] do_syscall_64+0xfd/0x620 [ 685.800241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.822264] RIP: 0033:0x45d35a [ 685.822280] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.822288] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 685.822305] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 685.833913] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 685.833923] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 685.833930] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 685.833938] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) socketpair(0x4, 0x5, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) socket$inet6(0xa, 0x3, 0xff) 10:19:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = msgget$private(0x0, 0x10) msgrcv(r2, &(0x7f0000000200)={0x0, ""/75}, 0x53, 0x3, 0x1000) r3 = accept4$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0xc00) accept(r3, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x80) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast2}, 0xe9) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x20) 10:19:22 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 686.132246] FAULT_INJECTION: forcing a failure. [ 686.132246] name failslab, interval 1, probability 0, space 0, times 0 10:19:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f48", 0x10) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x840) [ 686.224903] CPU: 0 PID: 32121 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 686.232803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.242178] Call Trace: [ 686.244793] dump_stack+0x197/0x210 [ 686.248447] should_fail.cold+0xa/0x1b [ 686.252364] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 686.252385] ? lock_downgrade+0x880/0x880 [ 686.252412] __should_failslab+0x121/0x190 [ 686.252427] should_failslab+0x9/0x14 [ 686.252440] kmem_cache_alloc_trace+0x2cc/0x760 [ 686.252453] ? kasan_unpoison_shadow+0x35/0x50 [ 686.252467] ? kasan_kmalloc+0xce/0xf0 [ 686.252488] __memcg_init_list_lru_node+0x8a/0x1e0 [ 686.252507] __list_lru_init+0x402/0x720 [ 686.269808] sget_userns+0x81b/0xd30 [ 686.269826] ? ns_test_super+0x50/0x50 [ 686.269844] ? set_bdev_super+0x120/0x120 [ 686.303781] ? set_bdev_super+0x120/0x120 [ 686.308133] ? ns_test_super+0x50/0x50 [ 686.312116] sget+0x10c/0x150 [ 686.315238] mount_bdev+0xff/0x3c0 [ 686.318793] ? isofs_bread+0xe0/0xe0 [ 686.322536] isofs_mount+0x35/0x40 [ 686.326101] mount_fs+0xa8/0x31f [ 686.329497] vfs_kern_mount.part.0+0x6f/0x410 [ 686.334020] do_mount+0x53e/0x2bc0 [ 686.337586] ? copy_mount_string+0x40/0x40 [ 686.341846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.347423] ? copy_mount_options+0x280/0x3a0 [ 686.351945] ksys_mount+0xdb/0x150 [ 686.355509] __x64_sys_mount+0xbe/0x150 [ 686.359501] do_syscall_64+0xfd/0x620 [ 686.363319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.368513] RIP: 0033:0x45d35a 10:19:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r2, &(0x7f0000000100)=0x0, &(0x7f0000000180)) ptrace$setopts(0x4200, r2, 0xb38, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000040)) ptrace$cont(0x7, r1, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x2c, &(0x7f0000000200)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e20, 0x1, @mcast1, 0xd9}]}, &(0x7f0000000180)=0x10) [ 686.371717] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 686.390634] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 686.398362] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 686.405648] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 686.413373] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:22 executing program 0: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) [ 686.420837] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 686.428375] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:22 executing program 5: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x401a1, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x6) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:22 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 686.634024] FAULT_INJECTION: forcing a failure. [ 686.634024] name failslab, interval 1, probability 0, space 0, times 0 [ 686.690693] CPU: 0 PID: 32147 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 686.698729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.708105] Call Trace: [ 686.710744] dump_stack+0x197/0x210 [ 686.714570] should_fail.cold+0xa/0x1b [ 686.718487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 686.723634] ? lock_downgrade+0x880/0x880 [ 686.727844] __should_failslab+0x121/0x190 [ 686.732098] should_failslab+0x9/0x14 [ 686.735916] kmem_cache_alloc_trace+0x2cc/0x760 [ 686.740603] ? kasan_unpoison_shadow+0x35/0x50 [ 686.745217] ? kasan_kmalloc+0xce/0xf0 [ 686.749127] __memcg_init_list_lru_node+0x8a/0x1e0 [ 686.754087] __list_lru_init+0x402/0x720 [ 686.758174] sget_userns+0x81b/0xd30 [ 686.761906] ? ns_test_super+0x50/0x50 [ 686.765816] ? set_bdev_super+0x120/0x120 [ 686.770076] ? set_bdev_super+0x120/0x120 [ 686.774239] ? ns_test_super+0x50/0x50 [ 686.778147] sget+0x10c/0x150 [ 686.781281] mount_bdev+0xff/0x3c0 [ 686.784846] ? isofs_bread+0xe0/0xe0 [ 686.788680] isofs_mount+0x35/0x40 [ 686.792244] mount_fs+0xa8/0x31f [ 686.795638] vfs_kern_mount.part.0+0x6f/0x410 [ 686.800159] do_mount+0x53e/0x2bc0 [ 686.803718] ? retint_kernel+0x2d/0x2d [ 686.807623] ? copy_mount_string+0x40/0x40 [ 686.811881] ? copy_mount_options+0x198/0x3a0 [ 686.816427] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 686.821730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.827293] ? copy_mount_options+0x280/0x3a0 [ 686.831909] ksys_mount+0xdb/0x150 [ 686.835484] __x64_sys_mount+0xbe/0x150 [ 686.839481] do_syscall_64+0xfd/0x620 [ 686.843307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.848523] RIP: 0033:0x45d35a [ 686.852007] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 686.871534] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 686.879359] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 686.887421] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 686.894703] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 686.901985] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 686.909317] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r4, 0x1, 0x6}, &(0x7f0000000040)=0xfffffffffffffdcf) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = getegid() syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000480)="d4328859ad12ed05ae7fa50716567a3a8144f72e6028f5a147677f7bf538e70cca55f16b3c4656ef5cb1f6cdfeda9e56b048c2088fe8fc66b57f2b56a95ac8559c1723f5540485b5fc7d1050c7139e94c591d70eaac77787c62fe9bbaa3a066d565e7a23a028b0c3ce55844ebb7a39560b8e8defb79d5bd8ff597e816f6d11e14d8b749e12518a8b33a9d72ebb66152a8c60f6490d3c59062de6929fd7d88c2a3f323c34f69d658ce29c9907d64f32921cc4dae5c8", 0xb5, 0x81}, {&(0x7f00000006c0)="6b5ab1333869a9180a3dd4055fadb9fcf52d471b87a7bd371ef77c2f39e2c7ab420d17a9e89927a8d0f669432e9ade00e85cb271fda7a324d1cf4b09c0b6273b98e7d5a53856e8c219d8f45bc24e5a64c992dee34d92354c6d172a1d79005ed31ecb3c7e205779d01f6997fd96de30105eee1bc4f71de9b1e0c8da5986e3b8ec8794c09588b5fa8a4dcf4dd02e133d2f60f2476824a8be1422bcce6fefe3a7bf92eaaba2ff936a3fc8d7acb88caa4055e66a7b3bdeec5a4807beab3bb66342affd3d49892606fc71972e16f96a93098d7c68dc10d6ec9195369e8e2b05fe0b76caf3f4556cc2c39cd8cd8bedc6cda0", 0xef, 0x4}, {&(0x7f00000007c0)="99133a4664289cfc0e129d45f92d94b48ebc72f7c57cf8a22403b7674993e8bec6c7ade473406f5dd541eaebce7fb0b2288de699341489911acd0a74cc4699a18673fd2304adf445874becd622f9ee22614cdd560d64e453b12681936dffafd9a410adf2f7e4295f2797cbb67abc92d5cff342315fa9ff21337fb4b60dffed52d834395e67305194c33aa638eda44f173782caebe514a97decc2f4c6b72db287b02ec9b0029ed0375356e43425d0c2d2baac1ad13b7376063922f9142fa3d060bc60e10f3e2b3382e22862b1c06ca61a32b0376470a108b43ee105ae860b91b6eef8d74cae425013edd1e2187f00052bf1174a321c9e", 0xf6, 0xe04}, {&(0x7f0000000240)="8a3a249ffc75a87108a60a4cbec821141e4ad7099be9", 0x16, 0x27}, {&(0x7f00000002c0)="4b52e995725043fe670f35e405f2be31fa0f5052e18d4b6f2ac4ea6b76", 0x1d, 0x7}, {&(0x7f0000000540)="147fc6b4606aa6f74aa7097a8f3eec00dfbf9eb4cb94b9de099bfcdfb704a8cdba51a61e8f421c8033c7a56959f2ae4d81f75792e35c1dc513d20263500deeeabf60998cc7cd758dcc60f59815fba92ba2a296cb3095ab9759aaea4bf33b085116f4a6cbd0b884aac96bf0849a49ca06bd0bc5ed2a9c1de8c3187262f71e28c345efb574d5d957ee36924ffa4a30dbca780dd409", 0x94, 0xc115}], 0x3023880, &(0x7f0000000340)={[{@gid={'gid', 0x3d, r6}}], [{@seclabel='seclabel'}, {@smackfstransmute={'smackfstransmute'}}]}) dup(r5) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:23 executing program 0: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x10005, @mcast1, 0x2}]}, &(0x7f0000000180)=0x397) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400400, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000140)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000000c0)={r8, 0x20, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000001c0)={r9, 0x8001}, &(0x7f0000000200)=0x8) 10:19:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:23 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:23 executing program 0: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) [ 687.078063] FAULT_INJECTION: forcing a failure. [ 687.078063] name failslab, interval 1, probability 0, space 0, times 0 [ 687.119286] CPU: 1 PID: 32161 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 687.127177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.136554] Call Trace: [ 687.136583] dump_stack+0x197/0x210 [ 687.136603] should_fail.cold+0xa/0x1b [ 687.136620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 687.136636] ? lock_downgrade+0x880/0x880 [ 687.136659] __should_failslab+0x121/0x190 [ 687.136676] should_failslab+0x9/0x14 [ 687.136690] kmem_cache_alloc_trace+0x2cc/0x760 [ 687.136705] ? kasan_unpoison_shadow+0x35/0x50 [ 687.136722] ? kasan_kmalloc+0xce/0xf0 [ 687.136744] __memcg_init_list_lru_node+0x8a/0x1e0 [ 687.136771] __list_lru_init+0x402/0x720 [ 687.136788] sget_userns+0x81b/0xd30 [ 687.136803] ? ns_test_super+0x50/0x50 [ 687.136824] ? set_bdev_super+0x120/0x120 [ 687.156542] ? set_bdev_super+0x120/0x120 [ 687.156558] ? ns_test_super+0x50/0x50 [ 687.156570] sget+0x10c/0x150 [ 687.156587] mount_bdev+0xff/0x3c0 [ 687.156602] ? isofs_bread+0xe0/0xe0 [ 687.156623] isofs_mount+0x35/0x40 [ 687.156640] mount_fs+0xa8/0x31f [ 687.156664] vfs_kern_mount.part.0+0x6f/0x410 [ 687.156683] do_mount+0x53e/0x2bc0 [ 687.156703] ? copy_mount_string+0x40/0x40 [ 687.156730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.173999] ? copy_mount_options+0x280/0x3a0 [ 687.174017] ksys_mount+0xdb/0x150 [ 687.182831] __x64_sys_mount+0xbe/0x150 [ 687.182854] do_syscall_64+0xfd/0x620 [ 687.182874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.182890] RIP: 0033:0x45d35a [ 687.269113] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 687.288473] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 687.296211] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 687.304321] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 687.311616] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) pipe2(&(0x7f0000000000), 0x80400) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x8000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f00000000c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040), 0x20) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000140)=""/201) [ 687.318908] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 687.326203] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:23 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:23 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e23, 0x6, @rand_addr="597210f5c50e525c1e3526d0f4f389de", 0xfffff0bb}}}, &(0x7f0000000200)=0x84) r5 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x2800) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) r6 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)=0x1bb) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 10:19:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:24 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:24 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x109844, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) syz_open_dev$tty1(0xc, 0x4, 0x3) 10:19:24 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) [ 688.013313] FAULT_INJECTION: forcing a failure. [ 688.013313] name failslab, interval 1, probability 0, space 0, times 0 [ 688.059526] CPU: 0 PID: 32200 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 688.067391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.076791] Call Trace: [ 688.079429] dump_stack+0x197/0x210 [ 688.083109] should_fail.cold+0xa/0x1b [ 688.087047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 688.092179] ? lock_downgrade+0x880/0x880 [ 688.096356] __should_failslab+0x121/0x190 [ 688.100607] should_failslab+0x9/0x14 [ 688.104422] kmem_cache_alloc_trace+0x2cc/0x760 [ 688.109152] ? kasan_unpoison_shadow+0x35/0x50 [ 688.113781] ? kasan_kmalloc+0xce/0xf0 [ 688.118346] __memcg_init_list_lru_node+0x8a/0x1e0 [ 688.123302] __list_lru_init+0x402/0x720 [ 688.127379] sget_userns+0x81b/0xd30 [ 688.131102] ? ns_test_super+0x50/0x50 [ 688.135008] ? set_bdev_super+0x120/0x120 [ 688.139163] ? set_bdev_super+0x120/0x120 [ 688.143319] ? ns_test_super+0x50/0x50 [ 688.147228] sget+0x10c/0x150 [ 688.150351] mount_bdev+0xff/0x3c0 [ 688.154054] ? isofs_bread+0xe0/0xe0 [ 688.157799] isofs_mount+0x35/0x40 [ 688.161372] mount_fs+0xa8/0x31f [ 688.164771] vfs_kern_mount.part.0+0x6f/0x410 [ 688.169286] do_mount+0x53e/0x2bc0 [ 688.172847] ? copy_mount_string+0x40/0x40 [ 688.177102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.182651] ? copy_mount_options+0x280/0x3a0 [ 688.187170] ksys_mount+0xdb/0x150 [ 688.190738] __x64_sys_mount+0xbe/0x150 [ 688.194736] do_syscall_64+0xfd/0x620 [ 688.198556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.203759] RIP: 0033:0x45d35a [ 688.206991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 688.225914] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 688.233653] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 688.240938] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 688.248229] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10003, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x24, 0x0, @local, 0x485}]}, &(0x7f0000000180)=0x10) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x280040, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) [ 688.255521] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 688.262810] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7ade", 0x8) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) fcntl$notify(r1, 0x402, 0x0) 10:19:24 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x1, @rand_addr="1aa170378b28ce9f1ed2761438a44ee2", 0x6}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x4, @mcast2, 0xed08}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @rand_addr=0x9}], 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) accept4$x25(r2, &(0x7f0000000180), &(0x7f00000001c0)=0x12, 0x800) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup3(r3, 0xffffffffffffffff, 0x180000) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000240)={0x0, @bt={0x80000000, 0x80, 0x1, 0x67e5eec77e9de35f, 0x526, 0x4, 0xfffffffc, 0x0, 0x1, 0x7fffffff, 0x157, 0x2, 0x9, 0x5e72, 0x6, 0x4}}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00', 0x4000}) 10:19:24 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 688.527899] FAULT_INJECTION: forcing a failure. [ 688.527899] name failslab, interval 1, probability 0, space 0, times 0 [ 688.596112] CPU: 1 PID: 32224 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 688.603987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.613692] Call Trace: [ 688.616314] dump_stack+0x197/0x210 [ 688.619989] should_fail.cold+0xa/0x1b [ 688.623905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 688.629113] ? lock_downgrade+0x880/0x880 [ 688.633288] __should_failslab+0x121/0x190 [ 688.637535] should_failslab+0x9/0x14 [ 688.641345] kmem_cache_alloc_trace+0x2cc/0x760 [ 688.646133] ? kasan_unpoison_shadow+0x35/0x50 [ 688.650733] ? kasan_kmalloc+0xce/0xf0 [ 688.654640] __memcg_init_list_lru_node+0x8a/0x1e0 [ 688.659583] __list_lru_init+0x402/0x720 [ 688.663662] sget_userns+0x81b/0xd30 [ 688.667390] ? ns_test_super+0x50/0x50 [ 688.671303] ? set_bdev_super+0x120/0x120 [ 688.675461] ? set_bdev_super+0x120/0x120 [ 688.679628] ? ns_test_super+0x50/0x50 [ 688.683530] sget+0x10c/0x150 [ 688.686743] mount_bdev+0xff/0x3c0 [ 688.690287] ? isofs_bread+0xe0/0xe0 [ 688.694114] isofs_mount+0x35/0x40 [ 688.697759] mount_fs+0xa8/0x31f [ 688.701142] vfs_kern_mount.part.0+0x6f/0x410 [ 688.705646] do_mount+0x53e/0x2bc0 [ 688.709201] ? copy_mount_string+0x40/0x40 [ 688.713446] ? copy_mount_options+0x1fe/0x3a0 [ 688.717963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.723507] ? copy_mount_options+0x280/0x3a0 [ 688.728015] ksys_mount+0xdb/0x150 [ 688.731563] __x64_sys_mount+0xbe/0x150 [ 688.735548] do_syscall_64+0xfd/0x620 [ 688.739377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.744743] RIP: 0033:0x45d35a [ 688.747959] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 688.766867] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 688.774597] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 688.781882] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 688.789176] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 688.796452] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 688.803728] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:25 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) 10:19:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) sched_setparam(r3, &(0x7f0000000040)=0x80000001) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000000)=0x4) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000240)) r7 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f00000002c0)=0x0) ioctl$TIOCSPGRP(r7, 0x5410, &(0x7f0000000340)=r9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000140)={r10, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r10, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:25 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000300)={@remote, r2}, 0x14) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000040)={r2, 0x7f, 0x2, 0x1f, 0x8, 0x1, 0x40}) [ 689.325351] FAULT_INJECTION: forcing a failure. [ 689.325351] name failslab, interval 1, probability 0, space 0, times 0 [ 689.350763] CPU: 1 PID: 32234 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 689.358641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.368012] Call Trace: [ 689.370630] dump_stack+0x197/0x210 [ 689.374815] should_fail.cold+0xa/0x1b [ 689.378740] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 689.383906] ? lock_downgrade+0x880/0x880 [ 689.388095] __should_failslab+0x121/0x190 [ 689.392360] should_failslab+0x9/0x14 [ 689.396204] kmem_cache_alloc_trace+0x2cc/0x760 [ 689.400910] ? kasan_unpoison_shadow+0x35/0x50 [ 689.405624] ? kasan_kmalloc+0xce/0xf0 [ 689.409550] __memcg_init_list_lru_node+0x8a/0x1e0 [ 689.414867] __list_lru_init+0x402/0x720 [ 689.418966] sget_userns+0x81b/0xd30 [ 689.423147] ? ns_test_super+0x50/0x50 [ 689.427064] ? set_bdev_super+0x120/0x120 [ 689.431258] ? set_bdev_super+0x120/0x120 [ 689.435437] ? ns_test_super+0x50/0x50 [ 689.439353] sget+0x10c/0x150 [ 689.442488] mount_bdev+0xff/0x3c0 [ 689.446071] ? isofs_bread+0xe0/0xe0 [ 689.450076] isofs_mount+0x35/0x40 [ 689.453649] mount_fs+0xa8/0x31f [ 689.457073] vfs_kern_mount.part.0+0x6f/0x410 [ 689.461595] do_mount+0x53e/0x2bc0 [ 689.465168] ? copy_mount_string+0x40/0x40 [ 689.469537] ? _copy_from_user+0xdd/0x150 [ 689.473709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.479267] ? copy_mount_options+0x280/0x3a0 [ 689.483820] ksys_mount+0xdb/0x150 [ 689.487390] __x64_sys_mount+0xbe/0x150 [ 689.491398] do_syscall_64+0xfd/0x620 [ 689.495229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.500433] RIP: 0033:0x45d35a [ 689.503651] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 689.522586] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 689.530329] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 689.537708] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 689.545011] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 689.552304] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 689.559604] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 689.570296] kauditd_printk_skb: 20 callbacks suppressed 10:19:25 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000200)={0x20, 0x5b, 0x40, 0x47ea}) [ 689.570311] audit: type=1800 audit(1576318765.855:637): pid=32237 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=62 res=0 10:19:25 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x81) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r1, r0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r1}}, 0xc) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) sched_setaffinity(r4, 0x8, &(0x7f0000000240)=0x101) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0xbef, {{0xa, 0x4e22, 0xec1, @remote, 0x80}}}, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 689.585408] audit: type=1804 audit(1576318765.855:638): pid=32237 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/947/file0/file0" dev="loop1" ino=62 res=1 10:19:25 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) 10:19:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) 10:19:26 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 689.786873] audit: type=1800 audit(1576318765.855:639): pid=32237 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=62 res=0 [ 689.913276] audit: type=1800 audit(1576318766.195:640): pid=32265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=63 res=0 [ 689.954986] audit: type=1804 audit(1576318766.195:641): pid=32265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/948/file0/file0" dev="loop1" ino=63 res=1 [ 690.017949] audit: type=1800 audit(1576318766.195:642): pid=32265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=63 res=0 [ 690.077426] FAULT_INJECTION: forcing a failure. [ 690.077426] name failslab, interval 1, probability 0, space 0, times 0 [ 690.120736] audit: type=1800 audit(1576318766.395:643): pid=32239 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17227 res=0 [ 690.160814] CPU: 1 PID: 32268 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 690.168692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.178079] Call Trace: [ 690.180692] dump_stack+0x197/0x210 [ 690.184345] should_fail.cold+0xa/0x1b [ 690.188353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 690.193593] ? lock_downgrade+0x880/0x880 [ 690.197802] __should_failslab+0x121/0x190 [ 690.202069] should_failslab+0x9/0x14 [ 690.205885] kmem_cache_alloc_trace+0x2cc/0x760 [ 690.210566] ? kasan_unpoison_shadow+0x35/0x50 [ 690.215164] ? kasan_kmalloc+0xce/0xf0 [ 690.219078] __memcg_init_list_lru_node+0x8a/0x1e0 [ 690.224160] __list_lru_init+0x402/0x720 [ 690.228330] sget_userns+0x81b/0xd30 [ 690.232080] ? ns_test_super+0x50/0x50 [ 690.235987] ? set_bdev_super+0x120/0x120 [ 690.240146] ? set_bdev_super+0x120/0x120 [ 690.244310] ? ns_test_super+0x50/0x50 [ 690.248210] sget+0x10c/0x150 [ 690.251340] mount_bdev+0xff/0x3c0 [ 690.254892] ? isofs_bread+0xe0/0xe0 [ 690.258626] isofs_mount+0x35/0x40 [ 690.262865] mount_fs+0xa8/0x31f [ 690.266252] vfs_kern_mount.part.0+0x6f/0x410 [ 690.270764] do_mount+0x53e/0x2bc0 [ 690.274333] ? copy_mount_string+0x40/0x40 [ 690.278697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.284255] ? copy_mount_options+0x280/0x3a0 [ 690.288775] ksys_mount+0xdb/0x150 [ 690.292344] __x64_sys_mount+0xbe/0x150 [ 690.296783] do_syscall_64+0xfd/0x620 [ 690.300615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.305960] RIP: 0033:0x45d35a [ 690.309197] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 690.328322] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 690.336060] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 690.343441] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 690.350729] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 690.358299] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 690.365594] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200}, 0x20) 10:19:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) 10:19:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80e, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xfffffe23, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x202000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xf0, &(0x7f0000000640)=""/240}) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0x1, 0x9, 0x81}) r2 = open(0x0, 0x519d00, 0x110) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r3, 0xffffffffffffffff, 0x0, 0x4000004, &(0x7f00000001c0)=@x25={0x9, @null=' \x00'}, 0x80) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000340)) fchown(r4, r6, r7) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) r8 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$DRM_IOCTL_MARK_BUFS(r8, 0x40206417, &(0x7f00000003c0)={0xef1, 0x1ff, 0x8001, 0x1, 0x8, 0x100000001}) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000240)) 10:19:26 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x0, 0x5b, 0x40, 0x47ea}) [ 690.593322] audit: type=1800 audit(1576318766.875:644): pid=32278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=64 res=0 10:19:26 executing program 5: syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7fff, 0x10000) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4d}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x9, 0x0}, 0x1000}], 0x58) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd98aa", 0x4) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 690.680347] audit: type=1804 audit(1576318766.875:645): pid=32278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/949/file0/file0" dev="loop1" ino=64 res=1 [ 690.723295] FAULT_INJECTION: forcing a failure. [ 690.723295] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.735535] CPU: 0 PID: 32287 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 690.743352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.752735] Call Trace: [ 690.755349] dump_stack+0x197/0x210 [ 690.759108] should_fail.cold+0xa/0x1b [ 690.763028] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 690.768154] ? debug_smp_processor_id+0x1c/0x20 [ 690.772857] ? perf_trace_lock+0xeb/0x510 [ 690.777028] ? mark_held_locks+0x100/0x100 [ 690.781287] __alloc_pages_nodemask+0x1ee/0x750 [ 690.786001] ? SOFTIRQ_verbose+0x10/0x10 [ 690.790091] ? ksys_mount+0xdb/0x150 [ 690.793824] ? __x64_sys_mount+0xbe/0x150 [ 690.798017] ? __alloc_pages_slowpath+0x2870/0x2870 [ 690.803097] cache_grow_begin+0x91/0x8c0 [ 690.807183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.812840] ? check_preemption_disabled+0x48/0x290 [ 690.818026] kmem_cache_alloc_node_trace+0x655/0x720 [ 690.823159] ? kmem_cache_alloc_trace+0x348/0x760 10:19:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x285) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000000a5ecfb49175284342cb978ae721fcf7d78a3c1f7f06ebc3bbd2afe8cc6c429d462e7a7155736bd30f4720c80f4b7073cf47849e6c8ea0412a259c6d2d147caf099d081ce523b9002c9181bfadf0432d5e0798da688d4d64dfc7b9dbe55e26588288edc29a49385b939541011f80c04bb7b771774aeaa16ec9120f305492d217ea7e7103394328411cf5153967657bf8673132faad64b6fd2b6a5adf5073299415f7f6b9d597a86dac8913ba552f96905fabf9103bb82a871ceb847ebe5c980f8f372a9497d37d5f8fa6e26caf6d8b7a49ba9bab90922a9d49e57efda959ec6991445add5ecf26c732c5f6ba6112d7c053d30cdb05f60e4cec514b3abcdcbdac1f9bfad5607c496b6b931627a4d5246dfd90e101fcbc2e982332c9d124c", @ANYRES32=0x0], &(0x7f0000000400)=0x8) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="01000002", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e24, 0x0, @loopback, 0x8}}, 0x1, 0x2}, 0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x84, 0x1000, 0x0, 0x0, 0x3ff, r3}, 0x20) accept4$unix(r1, &(0x7f0000000200), &(0x7f0000000040)=0x6e, 0xc91cc8d72983b22c) fallocate(r0, 0x28, 0xa17, 0x5) 10:19:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x0, 0x0, 0x40, 0x47ea}) [ 690.828027] ? kasan_unpoison_shadow+0x35/0x50 [ 690.832791] __kmalloc_node+0x3d/0x80 [ 690.836632] kvmalloc_node+0x68/0x100 [ 690.840488] __list_lru_init+0x4d9/0x720 [ 690.844582] sget_userns+0x81b/0xd30 [ 690.848316] ? ns_test_super+0x50/0x50 [ 690.852247] ? set_bdev_super+0x120/0x120 [ 690.856425] ? set_bdev_super+0x120/0x120 [ 690.860589] ? ns_test_super+0x50/0x50 [ 690.864499] sget+0x10c/0x150 [ 690.867654] mount_bdev+0xff/0x3c0 [ 690.871215] ? isofs_bread+0xe0/0xe0 [ 690.874952] isofs_mount+0x35/0x40 [ 690.878519] mount_fs+0xa8/0x31f [ 690.881938] vfs_kern_mount.part.0+0x6f/0x410 [ 690.886463] do_mount+0x53e/0x2bc0 [ 690.890124] ? copy_mount_string+0x40/0x40 [ 690.894382] ? _copy_from_user+0xdd/0x150 [ 690.898561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.904124] ? copy_mount_options+0x280/0x3a0 [ 690.908652] ksys_mount+0xdb/0x150 [ 690.912237] __x64_sys_mount+0xbe/0x150 [ 690.916250] do_syscall_64+0xfd/0x620 [ 690.920087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.925304] RIP: 0033:0x45d35a [ 690.928518] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 690.947526] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 690.949727] audit: type=1800 audit(1576318766.875:646): pid=32278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=64 res=0 [ 690.955571] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 690.955581] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 690.955589] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 690.955597] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 690.955606] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 690.972185] ISOFS: Unable to identify CD-ROM format. 10:19:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x47ea}) 10:19:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:27 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)) 10:19:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') r2 = accept4(r0, &(0x7f0000000240)=@in={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x80, 0x40000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000340)=""/222, &(0x7f0000000440)=0xde) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) r4 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f00000001c0)=0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r3) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x3, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x408001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r7) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r8, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r9) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r10, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r11) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r12, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0}]) r13 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x250000, 0x2) ppoll(&(0x7f0000000540)=[{r6, 0x200}, {r7, 0x220}, {r9, 0xe4bc57e1485e38b6}, {r11, 0x89}, {r13, 0x4401}, {r0, 0x4}], 0x6, &(0x7f0000000580)={0x0, 0x989680}, &(0x7f00000005c0)={0x7fffffff}, 0x8) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000480)={0x6, 0x8000, 0x8, 0x1, 0x4, 0x4}) 10:19:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 691.691453] FAULT_INJECTION: forcing a failure. [ 691.691453] name failslab, interval 1, probability 0, space 0, times 0 [ 691.749652] CPU: 0 PID: 32310 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 691.757531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.767253] Call Trace: [ 691.769873] dump_stack+0x197/0x210 [ 691.773534] should_fail.cold+0xa/0x1b [ 691.777457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 691.782592] ? lock_downgrade+0x880/0x880 [ 691.792610] __should_failslab+0x121/0x190 [ 691.796873] should_failslab+0x9/0x14 [ 691.800691] kmem_cache_alloc_node_trace+0x274/0x720 [ 691.805825] ? kmem_cache_alloc_trace+0x348/0x760 [ 691.810696] ? kasan_unpoison_shadow+0x35/0x50 [ 691.815302] __kmalloc_node+0x3d/0x80 [ 691.819125] kvmalloc_node+0x68/0x100 [ 691.823146] __list_lru_init+0x4d9/0x720 [ 691.827240] sget_userns+0x81b/0xd30 [ 691.830994] ? ns_test_super+0x50/0x50 [ 691.834910] ? set_bdev_super+0x120/0x120 [ 691.839085] ? set_bdev_super+0x120/0x120 [ 691.843247] ? ns_test_super+0x50/0x50 10:19:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 691.847157] sget+0x10c/0x150 [ 691.850984] mount_bdev+0xff/0x3c0 [ 691.854534] ? isofs_bread+0xe0/0xe0 [ 691.858275] isofs_mount+0x35/0x40 [ 691.861839] mount_fs+0xa8/0x31f [ 691.865238] vfs_kern_mount.part.0+0x6f/0x410 [ 691.869762] do_mount+0x53e/0x2bc0 [ 691.873329] ? copy_mount_string+0x40/0x40 [ 691.877607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.883159] ? copy_mount_options+0x280/0x3a0 [ 691.887689] ksys_mount+0xdb/0x150 [ 691.891254] __x64_sys_mount+0xbe/0x150 [ 691.895256] do_syscall_64+0xfd/0x620 [ 691.899081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.905069] RIP: 0033:0x45d35a [ 691.908973] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 691.928068] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 691.935802] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 691.943124] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 691.950502] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 691.957787] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 691.965074] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r4 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r6, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}]) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000005c0)={r5}) sendmsg$TIPC_CMD_GET_LINKS(r7, &(0x7f0000000200)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x1, 0x470bd27, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0xffffffffffffff28, 0x11, 0x5}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x8440) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="001528bd70006c5fc1db175ae4813512dcdf25010000000000000001410000001800170000de0000000000754f8814b8967f760a66902d3f89be6470"], 0x3}, 0x1, 0x0, 0x0, 0x20000}, 0x10) r8 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000280)=0x4) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480)={0x8, 0x7f}, 0xc) r9 = open(0x0, 0x0, 0x0) r10 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r10, &(0x7f0000000100)=0x0, &(0x7f0000000180)) syz_open_procfs(r10, &(0x7f00000004c0)='limits\x00') getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f00000003c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x80000000, @ipv4={[], [], @local}, 0x800}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x558, @rand_addr="3fb8cf77484c4f3e7c3d55b757240031", 0x6}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0xa5c, @mcast1, 0x8000}], 0xc0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x7, 0x4, 0x0, 0x0, 0x1, 0xc231, 0x4e3}, 0x20) 10:19:28 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:28 executing program 5: socket$inet6_sctp(0xa, 0x801, 0x84) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"/283], 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0x0, @perf_bp={0x0}, 0xa09}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) getegid() connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) r4 = syz_open_procfs(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x2000000c}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup\x00F\xee\xdc\xb6\ri\xac\x8d\xa1\xdd!D\xee\x1b\x1a\x8e\x8a\x9c\xa1evI\xa4\x03\'\xe5\n\xecf\xfb\x979\xca`@\x93\x1dtB\x102\xd1\xcc\x18\x92\xd3\xb4\xeb\xa4\x8b\xb8@\xec\xba\x9aEg\xb0\x91\xfe\x03\x97\x9eAv\x1bf\x13-\x93g\xc7C\xe2,\xf7xG\xf9``\x92|ZY&L\xf9_\xb70\x9a\n\xc9\xe0m\x0el\xe6\xfe\x01\x1e@\x1a\x90\x94X\xaf@\xc1\x95\xdb*mg\x8cb\x90\xd4\xd9S\x8e\xcd\n\xdf\x16e\xcc\xfa\xb0\bw)\'\xa8\x90\xd4\x83\x0f\xb1\xfc\xb9\xd3\xa5\xe2;H &,\xb2\xc0\xddT\xd6\x10R\xff\xb4\x82\xb20Z\xda[,\x19MD\xf89\xa5\xbc+\tF\x88\x0e\xe2\xce\xaf\xdd\n\x13\xc5\x80\'k0\"=\x8f\x16\x0f\x91S\x04\xbc', 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") pipe2(&(0x7f0000000280), 0x400) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2}, 0x1a) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) 10:19:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x20) [ 692.417358] FAULT_INJECTION: forcing a failure. [ 692.417358] name failslab, interval 1, probability 0, space 0, times 0 [ 692.468887] CPU: 1 PID: 32339 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 692.476783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.486164] Call Trace: [ 692.486193] dump_stack+0x197/0x210 [ 692.486214] should_fail.cold+0xa/0x1b [ 692.486232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 692.486249] ? lock_downgrade+0x880/0x880 [ 692.486276] __should_failslab+0x121/0x190 [ 692.486291] should_failslab+0x9/0x14 [ 692.486310] kmem_cache_alloc_trace+0x2cc/0x760 [ 692.518360] ? kasan_unpoison_shadow+0x35/0x50 [ 692.523005] ? kasan_kmalloc+0xce/0xf0 [ 692.523029] __memcg_init_list_lru_node+0x8a/0x1e0 [ 692.523049] __list_lru_init+0x402/0x720 [ 692.523068] sget_userns+0x81b/0xd30 [ 692.523084] ? ns_test_super+0x50/0x50 [ 692.523102] ? set_bdev_super+0x120/0x120 [ 692.523120] ? set_bdev_super+0x120/0x120 [ 692.551963] ? ns_test_super+0x50/0x50 [ 692.555868] sget+0x10c/0x150 [ 692.558991] mount_bdev+0xff/0x3c0 [ 692.562560] ? isofs_bread+0xe0/0xe0 [ 692.566291] isofs_mount+0x35/0x40 [ 692.569838] mount_fs+0xa8/0x31f [ 692.573312] vfs_kern_mount.part.0+0x6f/0x410 [ 692.577829] do_mount+0x53e/0x2bc0 [ 692.582372] ? copy_mount_string+0x40/0x40 [ 692.586632] ? _copy_from_user+0xdd/0x150 [ 692.590801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.596361] ? copy_mount_options+0x280/0x3a0 [ 692.600885] ksys_mount+0xdb/0x150 [ 692.604453] __x64_sys_mount+0xbe/0x150 [ 692.608457] do_syscall_64+0xfd/0x620 [ 692.612283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.617492] RIP: 0033:0x45d35a [ 692.620707] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 692.639839] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 692.647577] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 692.654957] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 692.662249] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 692.669631] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 692.676928] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)="34fd", 0x2) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:29 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)) 10:19:29 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 693.299932] FAULT_INJECTION: forcing a failure. [ 693.299932] name failslab, interval 1, probability 0, space 0, times 0 [ 693.411599] CPU: 0 PID: 32378 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 693.420162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.429543] Call Trace: [ 693.432153] dump_stack+0x197/0x210 [ 693.435817] should_fail.cold+0xa/0x1b [ 693.439726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 693.444854] ? lock_downgrade+0x880/0x880 [ 693.449201] __should_failslab+0x121/0x190 [ 693.453456] should_failslab+0x9/0x14 [ 693.457276] kmem_cache_alloc_trace+0x2cc/0x760 [ 693.461971] ? kasan_unpoison_shadow+0x35/0x50 [ 693.466573] ? kasan_kmalloc+0xce/0xf0 [ 693.470500] __memcg_init_list_lru_node+0x8a/0x1e0 [ 693.470521] __list_lru_init+0x402/0x720 [ 693.470540] sget_userns+0x81b/0xd30 [ 693.483244] ? ns_test_super+0x50/0x50 [ 693.483266] ? set_bdev_super+0x120/0x120 [ 693.483281] ? set_bdev_super+0x120/0x120 [ 693.483297] ? ns_test_super+0x50/0x50 [ 693.495470] sget+0x10c/0x150 [ 693.495492] mount_bdev+0xff/0x3c0 [ 693.502507] ? isofs_bread+0xe0/0xe0 [ 693.502526] isofs_mount+0x35/0x40 [ 693.502541] mount_fs+0xa8/0x31f [ 693.502563] vfs_kern_mount.part.0+0x6f/0x410 [ 693.502580] do_mount+0x53e/0x2bc0 [ 693.502599] ? copy_mount_string+0x40/0x40 [ 693.528993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.534671] ? copy_mount_options+0x280/0x3a0 [ 693.539206] ksys_mount+0xdb/0x150 [ 693.542765] __x64_sys_mount+0xbe/0x150 [ 693.546755] do_syscall_64+0xfd/0x620 [ 693.550582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.555776] RIP: 0033:0x45d35a 10:19:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x200, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @local, 0x2}, 0x1c) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000140)={0x1}) 10:19:29 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)) 10:19:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 693.558978] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 693.578056] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 693.585782] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 693.593601] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 693.600906] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000040)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) [ 693.608197] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 693.615484] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:30 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x2, &(0x7f0000000200)) 10:19:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000040)={0x9, 0x2, 0x1, 0x8, 'syz0\x00'}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0x80000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) 10:19:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0xfffffffffffffde5) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) accept4$ax25(r4, 0x0, &(0x7f00000000c0), 0xc00) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(0x0, 0x0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r5, 0xc0745645, &(0x7f0000000180)={0x6, [0x4, 0x6, 0x200, 0x5, 0x1, 0x3, 0xa, 0x4, 0x4, 0x0, 0x3, 0xa9, 0x800, 0x1, 0x80, 0xd8, 0x0, 0x2, 0xe9c, 0x1, 0x0, 0x8, 0x6b3f, 0x100, 0x5, 0x242, 0x1, 0x6, 0x8, 0x0, 0x8, 0xff89, 0x800, 0x1, 0x401, 0x3, 0x3ff, 0xfffe, 0x100, 0x0, 0x8, 0x0, 0x7ff, 0x7f, 0x800, 0x0, 0xfb65, 0x16], 0xa}) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$USBDEVFS_DROP_PRIVILEGES(r5, 0x4004551e, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:30 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:30 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x4b47, &(0x7f0000000200)) 10:19:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:30 executing program 5: socket$inet6_sctp(0xa, 0x801, 0x84) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000100)}, &(0x7f00000001c0)=0xfffffffffffffdf7) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) connect$x25(r1, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 694.369327] FAULT_INJECTION: forcing a failure. [ 694.369327] name failslab, interval 1, probability 0, space 0, times 0 10:19:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 694.446060] CPU: 1 PID: 32436 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 694.453915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.464425] Call Trace: [ 694.467037] dump_stack+0x197/0x210 [ 694.470688] should_fail.cold+0xa/0x1b [ 694.474600] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 694.479731] ? lock_downgrade+0x880/0x880 [ 694.483904] __should_failslab+0x121/0x190 [ 694.488192] should_failslab+0x9/0x14 [ 694.492028] kmem_cache_alloc_trace+0x2cc/0x760 [ 694.496720] ? kasan_unpoison_shadow+0x35/0x50 [ 694.501333] ? kasan_kmalloc+0xce/0xf0 [ 694.505248] __memcg_init_list_lru_node+0x8a/0x1e0 [ 694.510203] __list_lru_init+0x402/0x720 [ 694.514287] sget_userns+0x81b/0xd30 [ 694.518019] ? ns_test_super+0x50/0x50 [ 694.521937] ? set_bdev_super+0x120/0x120 [ 694.526110] ? set_bdev_super+0x120/0x120 [ 694.530268] ? ns_test_super+0x50/0x50 [ 694.534170] sget+0x10c/0x150 [ 694.537294] mount_bdev+0xff/0x3c0 [ 694.540860] ? isofs_bread+0xe0/0xe0 [ 694.544593] isofs_mount+0x35/0x40 [ 694.548148] mount_fs+0xa8/0x31f [ 694.551545] vfs_kern_mount.part.0+0x6f/0x410 [ 694.556091] do_mount+0x53e/0x2bc0 [ 694.559648] ? retint_kernel+0x2d/0x2d [ 694.563552] ? copy_mount_string+0x40/0x40 [ 694.567834] ? copy_mount_options+0x208/0x3a0 [ 694.572346] ? write_comp_data+0x1e/0x70 [ 694.576430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.581991] ? copy_mount_options+0x280/0x3a0 [ 694.586502] ksys_mount+0xdb/0x150 [ 694.590060] __x64_sys_mount+0xbe/0x150 [ 694.594065] do_syscall_64+0xfd/0x620 [ 694.597892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.603121] RIP: 0033:0x45d35a [ 694.606332] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 694.625256] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 694.632992] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a 10:19:30 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x4b49, &(0x7f0000000200)) [ 694.640288] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 694.647584] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 694.655686] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 694.662977] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:31 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5409, &(0x7f0000000200)) 10:19:31 executing program 5: socket$inet6_sctp(0xa, 0x801, 0x84) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x14e) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000200)=0x1) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000140)={r7, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000040)={r7, 0x5f0, 0x10}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r8, 0x6, 0x0, 0x3, 0x39}, &(0x7f0000000100)=0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffe, @rand_addr="128a8c8b9a453491f1a53d4622f2b262", 0xfffffffe}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) 10:19:31 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x540b, &(0x7f0000000200)) 10:19:31 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 694.867122] kauditd_printk_skb: 28 callbacks suppressed [ 694.867136] audit: type=1800 audit(1576318771.145:675): pid=32459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=73 res=0 [ 694.883369] audit: type=1804 audit(1576318771.165:676): pid=32459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/958/file0/file0" dev="loop1" ino=73 res=1 [ 694.983863] FAULT_INJECTION: forcing a failure. [ 694.983863] name failslab, interval 1, probability 0, space 0, times 0 [ 695.075917] CPU: 1 PID: 32468 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 695.083778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.093240] Call Trace: [ 695.095853] dump_stack+0x197/0x210 [ 695.099501] should_fail.cold+0xa/0x1b [ 695.103411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.108534] ? lock_downgrade+0x880/0x880 [ 695.112709] __should_failslab+0x121/0x190 [ 695.116965] should_failslab+0x9/0x14 [ 695.120785] kmem_cache_alloc_trace+0x2cc/0x760 [ 695.125469] ? kasan_unpoison_shadow+0x35/0x50 [ 695.130066] ? kasan_kmalloc+0xce/0xf0 [ 695.133969] __memcg_init_list_lru_node+0x8a/0x1e0 [ 695.138917] __list_lru_init+0x402/0x720 [ 695.143084] sget_userns+0x81b/0xd30 [ 695.146812] ? ns_test_super+0x50/0x50 [ 695.150723] ? set_bdev_super+0x120/0x120 [ 695.154888] ? set_bdev_super+0x120/0x120 [ 695.159047] ? ns_test_super+0x50/0x50 [ 695.162948] sget+0x10c/0x150 [ 695.166074] mount_bdev+0xff/0x3c0 [ 695.171059] ? isofs_bread+0xe0/0xe0 [ 695.174792] isofs_mount+0x35/0x40 [ 695.178349] mount_fs+0xa8/0x31f [ 695.181734] vfs_kern_mount.part.0+0x6f/0x410 [ 695.186245] do_mount+0x53e/0x2bc0 [ 695.189816] ? copy_mount_string+0x40/0x40 [ 695.194076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.199626] ? copy_mount_options+0x280/0x3a0 [ 695.204174] ksys_mount+0xdb/0x150 [ 695.207733] __x64_sys_mount+0xbe/0x150 [ 695.211743] do_syscall_64+0xfd/0x620 [ 695.215566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.220761] RIP: 0033:0x45d35a [ 695.223961] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 695.242963] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 695.250687] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 695.258182] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 695.265470] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 695.272931] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 695.280233] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 695.318668] audit: type=1800 audit(1576318771.205:677): pid=32459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=73 res=0 [ 695.427796] audit: type=1800 audit(1576318771.595:678): pid=32452 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17244 res=0 [ 695.697988] audit: type=1800 audit(1576318771.975:679): pid=32462 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17239 res=0 10:19:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x401) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000300)={@remote, r4}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', r4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) sendmsg$nl_xfrm(r2, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="90030000180000042bbd7000fddbdf25fe8000000000000000000000000000aa000000000000000000000000000000004e2401004e230fff0a0000205e000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="ff020000000000000000000000000001000004d4ff00000000000006000000000000000000000000f7ffffffffffffff060000000000000002000000000000008000000000000000dfc3000000000000350000000000000059c3000000000000bfffffffffffffff0100000000000000ffff0000000000000500000000000000faffffffffffffff0000000007000000cb00000028bd700005350000020002bd400000000000000003000000000000000c000f00a2790000000000000c001c00", @ANYRES32=r8, @ANYBLOB="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"], 0x390}, 0x1, 0x0, 0x0, 0x1}, 0x40) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1d}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:32 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x540c, &(0x7f0000000200)) 10:19:32 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:32 executing program 5: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2901) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) 10:19:32 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x540d, &(0x7f0000000200)) [ 695.850049] audit: type=1800 audit(1576318772.125:680): pid=32482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=74 res=0 [ 695.884663] FAULT_INJECTION: forcing a failure. [ 695.884663] name failslab, interval 1, probability 0, space 0, times 0 [ 695.895472] audit: type=1804 audit(1576318772.155:681): pid=32482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/959/file0/file0" dev="loop1" ino=74 res=1 [ 695.928158] CPU: 1 PID: 32481 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 695.936233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.945619] Call Trace: [ 695.946220] audit: type=1800 audit(1576318772.155:682): pid=32482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=74 res=0 [ 695.948233] dump_stack+0x197/0x210 [ 695.948263] should_fail.cold+0xa/0x1b [ 695.978287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.978306] ? lock_downgrade+0x880/0x880 [ 695.987572] __should_failslab+0x121/0x190 [ 695.991830] should_failslab+0x9/0x14 [ 695.995654] __kmalloc+0x2e2/0x750 [ 695.999216] ? __list_lru_init+0xd5/0x720 [ 696.003371] __list_lru_init+0xd5/0x720 [ 696.003390] sget_userns+0x84a/0xd30 [ 696.003406] ? ns_test_super+0x50/0x50 [ 696.003423] ? set_bdev_super+0x120/0x120 [ 696.003440] ? set_bdev_super+0x120/0x120 [ 696.011128] ? ns_test_super+0x50/0x50 [ 696.011141] sget+0x10c/0x150 [ 696.011159] mount_bdev+0xff/0x3c0 [ 696.011174] ? isofs_bread+0xe0/0xe0 [ 696.011194] isofs_mount+0x35/0x40 [ 696.041312] mount_fs+0xa8/0x31f [ 696.044702] vfs_kern_mount.part.0+0x6f/0x410 [ 696.049217] do_mount+0x53e/0x2bc0 [ 696.052786] ? copy_mount_string+0x40/0x40 [ 696.057059] ? _copy_from_user+0xdd/0x150 [ 696.061255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.066802] ? copy_mount_options+0x280/0x3a0 [ 696.071312] ksys_mount+0xdb/0x150 [ 696.074871] __x64_sys_mount+0xbe/0x150 [ 696.078872] do_syscall_64+0xfd/0x620 [ 696.082706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.087918] RIP: 0033:0x45d35a [ 696.091133] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 696.110053] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 696.117962] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 696.125274] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 696.132585] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 696.139872] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 10:19:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 696.147156] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000200)=0x1e) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="f4df2ad4707941c4970d0f083dac801c44d1eccc6d3fd4337f02cc2e19e94cd65bd84ea7eca9d20a85e92e70760aed08689d0d02c060e24cc5dd4a7db41f43d753599cb80474fba975b1c98d1228e5eaab640d4d225cb894a3c2ba8469c036b457315a780efd28771ee1c2e9691557b682348b8c79ab1db8f6729000e852df676c1ed98f1b6d9ad01447819d1b99e3", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={r5, 0x80}, 0x8) 10:19:32 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5412, &(0x7f0000000200)) 10:19:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000000)={r4, 0x27, "013e5f4e2ce19f5253f8059bb92af72b8573e8243052271b20baeecfb779fcba279b331755c0ed"}, &(0x7f0000000040)=0x2f) [ 696.338931] [U] ^@ [ 696.354077] audit: type=1800 audit(1576318772.635:683): pid=32500 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=75 res=0 10:19:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 696.452724] audit: type=1804 audit(1576318772.635:684): pid=32500 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/960/file0/file0" dev="loop1" ino=75 res=1 10:19:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:33 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5413, &(0x7f0000000200)) 10:19:33 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 10:19:33 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5415, &(0x7f0000000200)) [ 696.948956] FAULT_INJECTION: forcing a failure. [ 696.948956] name failslab, interval 1, probability 0, space 0, times 0 [ 696.989171] CPU: 1 PID: 32517 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 696.999390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.008755] Call Trace: [ 697.011394] dump_stack+0x197/0x210 [ 697.011418] should_fail.cold+0xa/0x1b [ 697.011437] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.011454] ? lock_downgrade+0x880/0x880 [ 697.011477] __should_failslab+0x121/0x190 [ 697.032477] should_failslab+0x9/0x14 [ 697.036293] kmem_cache_alloc_trace+0x2cc/0x760 [ 697.040999] ? kasan_unpoison_shadow+0x35/0x50 [ 697.045598] ? kasan_kmalloc+0xce/0xf0 [ 697.049507] __memcg_init_list_lru_node+0x8a/0x1e0 [ 697.054481] __list_lru_init+0x402/0x720 [ 697.058556] sget_userns+0x81b/0xd30 [ 697.062286] ? ns_test_super+0x50/0x50 [ 697.066197] ? set_bdev_super+0x120/0x120 [ 697.070365] ? set_bdev_super+0x120/0x120 [ 697.074529] ? ns_test_super+0x50/0x50 [ 697.078432] sget+0x10c/0x150 [ 697.081549] mount_bdev+0xff/0x3c0 [ 697.085098] ? isofs_bread+0xe0/0xe0 [ 697.088833] isofs_mount+0x35/0x40 [ 697.092391] mount_fs+0xa8/0x31f [ 697.095776] vfs_kern_mount.part.0+0x6f/0x410 [ 697.100286] do_mount+0x53e/0x2bc0 [ 697.103843] ? copy_mount_string+0x40/0x40 [ 697.108105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.113674] ? copy_mount_options+0x280/0x3a0 [ 697.118182] ksys_mount+0xdb/0x150 [ 697.121738] __x64_sys_mount+0xbe/0x150 [ 697.125730] do_syscall_64+0xfd/0x620 [ 697.129550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.134743] RIP: 0033:0x45d35a [ 697.137940] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 697.156954] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 697.164682] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 697.171961] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 697.179239] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 697.186548] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 697.193832] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x900, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000040)={0x1, {0x77359400}, 0x80, 0x4}) 10:19:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7) 10:19:33 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0xc4c6, @remote, 0xffffffbf}, @in6={0xa, 0x4e20, 0xffffffff, @local, 0x1000}], 0x58) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, 0x20) 10:19:33 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5416, &(0x7f0000000200)) 10:19:33 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffff9, 0x40000) ioctl$SNDRV_PCM_IOCTL_START(r0, 0x4142, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r4, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r6, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}]) r7 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r2, r8, 0x0, 0x80001d00c0d0) ioctl$sock_bt_hci(r8, 0x400448e7, &(0x7f00000001c0)="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") 10:19:33 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5418, &(0x7f0000000200)) 10:19:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7) 10:19:34 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000000)=""/90, &(0x7f0000000080)=0x5a) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) 10:19:34 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x541b, &(0x7f0000000200)) [ 697.937528] FAULT_INJECTION: forcing a failure. [ 697.937528] name failslab, interval 1, probability 0, space 0, times 0 [ 697.971206] CPU: 0 PID: 32545 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 697.979076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.988444] Call Trace: [ 697.988471] dump_stack+0x197/0x210 [ 697.988493] should_fail.cold+0xa/0x1b [ 697.998686] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.003807] ? lock_downgrade+0x880/0x880 [ 698.007978] __should_failslab+0x121/0x190 [ 698.007998] should_failslab+0x9/0x14 [ 698.008011] kmem_cache_alloc_node_trace+0x274/0x720 [ 698.008033] __kmalloc_node+0x3d/0x80 [ 698.025922] kvmalloc_node+0x68/0x100 [ 698.029742] __list_lru_init+0x4d9/0x720 [ 698.033824] sget_userns+0x84a/0xd30 [ 698.037553] ? ns_test_super+0x50/0x50 [ 698.041463] ? set_bdev_super+0x120/0x120 [ 698.045632] ? set_bdev_super+0x120/0x120 [ 698.049936] ? ns_test_super+0x50/0x50 [ 698.053849] sget+0x10c/0x150 [ 698.056976] mount_bdev+0xff/0x3c0 [ 698.060532] ? isofs_bread+0xe0/0xe0 [ 698.064280] isofs_mount+0x35/0x40 [ 698.067841] mount_fs+0xa8/0x31f [ 698.071318] vfs_kern_mount.part.0+0x6f/0x410 [ 698.075834] do_mount+0x53e/0x2bc0 [ 698.079392] ? copy_mount_string+0x40/0x40 [ 698.083650] ? copy_mount_options+0x208/0x3a0 [ 698.088169] ? copy_mount_options+0x193/0x3a0 [ 698.092681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.098247] ? copy_mount_options+0x280/0x3a0 [ 698.102764] ksys_mount+0xdb/0x150 [ 698.106758] __x64_sys_mount+0xbe/0x150 [ 698.110747] do_syscall_64+0xfd/0x620 [ 698.114577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.119776] RIP: 0033:0x45d35a 10:19:34 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x541d, &(0x7f0000000200)) [ 698.123004] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 698.141917] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 698.149667] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 698.156956] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 698.164254] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 698.171545] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 698.178856] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:34 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) sendmsg$inet_sctp(r1, &(0x7f0000000280)={&(0x7f0000000040)=@in6={0xa, 0x2, 0x6fd2, @mcast2, 0x3943}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000000c0)="8e1d405ca7a9b6ced5108df18d223cb948bf32057241cacde56bfc92a2de772c84512862464a2545a81da54767078674c84632681ecd00f8edeb8f47dc1db272567d56ab9c5ce4acd6ab3efa1f441a1b8dfc9bfaa4f7a11b4b8cf06228ca398db585cb3eae3ffa963ea5d547444163f5fc48ff3e1bd41dc94b8bb593ea1546ba541f514bc27ab9a27c84b6fbdba74e40477ceb2fd8", 0x95}, {&(0x7f0000000180)="d9173566f2c27d33a7dc6a7e0bc351d93da71b1c398c579b2d07c29e6a8c6463ff9efb37231824df8ba48e14d95a0cf29f8493efba6439768f96bbe9983e90e574162a78bea9023da1ff7806055363c022b72de38aeffc09e8d9068e4f8c7f81e370955fa064ab81433162922d88e4fbcde1bcf26b39bbe0ef15fc5b4284cc0a3b64e7dfab7ec456cab921667535a324a14857acc5d1e00e0abc72e3a8acf5862272517d9da59f943120b98313d93895667fbb976c624b45b945ba3368", 0xbd}], 0x2, 0x0, 0x0, 0x20000}, 0x7cbf8bb49ca5d737) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7) 10:19:34 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:34 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x541f, &(0x7f0000000200)) 10:19:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) 10:19:34 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e20, @rand_addr=0x5}], 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x400000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)={r2, 0x1}) 10:19:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote}]}, &(0x7f0000000180)=0x10) [ 698.612892] FAULT_INJECTION: forcing a failure. [ 698.612892] name failslab, interval 1, probability 0, space 0, times 0 [ 698.646994] CPU: 1 PID: 32581 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 698.654942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.664318] Call Trace: [ 698.666930] dump_stack+0x197/0x210 [ 698.670584] should_fail.cold+0xa/0x1b [ 698.674493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.679626] ? lock_downgrade+0x880/0x880 [ 698.683921] __should_failslab+0x121/0x190 [ 698.688179] should_failslab+0x9/0x14 [ 698.692112] kmem_cache_alloc_trace+0x2cc/0x760 [ 698.696890] ? kasan_unpoison_shadow+0x35/0x50 [ 698.701488] ? kasan_kmalloc+0xce/0xf0 [ 698.705402] __memcg_init_list_lru_node+0x8a/0x1e0 [ 698.710442] __list_lru_init+0x402/0x720 [ 698.714527] sget_userns+0x81b/0xd30 [ 698.718270] ? ns_test_super+0x50/0x50 [ 698.722196] ? set_bdev_super+0x120/0x120 [ 698.726364] ? set_bdev_super+0x120/0x120 [ 698.730553] ? ns_test_super+0x50/0x50 [ 698.734445] sget+0x10c/0x150 [ 698.737563] mount_bdev+0xff/0x3c0 [ 698.741113] ? isofs_bread+0xe0/0xe0 [ 698.744845] isofs_mount+0x35/0x40 [ 698.748837] mount_fs+0xa8/0x31f [ 698.752227] vfs_kern_mount.part.0+0x6f/0x410 [ 698.756740] do_mount+0x53e/0x2bc0 [ 698.760303] ? copy_mount_string+0x40/0x40 [ 698.764554] ? _copy_from_user+0xdd/0x150 [ 698.768722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.774302] ? copy_mount_options+0x280/0x3a0 [ 698.778817] ksys_mount+0xdb/0x150 [ 698.782374] __x64_sys_mount+0xbe/0x150 [ 698.786364] do_syscall_64+0xfd/0x620 [ 698.790185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.795384] RIP: 0033:0x45d35a [ 698.798594] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 698.817517] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 698.825530] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 698.832917] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 698.840206] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 698.847584] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 698.855144] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x14) 10:19:35 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5421, &(0x7f0000000200)) 10:19:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) 10:19:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) 10:19:35 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 699.205244] FAULT_INJECTION: forcing a failure. [ 699.205244] name failslab, interval 1, probability 0, space 0, times 0 10:19:35 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5423, &(0x7f0000000200)) 10:19:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) [ 699.250505] CPU: 1 PID: 32595 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 699.258379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.267758] Call Trace: [ 699.270373] dump_stack+0x197/0x210 [ 699.274032] should_fail.cold+0xa/0x1b [ 699.277981] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.283110] ? lock_downgrade+0x880/0x880 [ 699.287296] __should_failslab+0x121/0x190 [ 699.291729] should_failslab+0x9/0x14 [ 699.295577] kmem_cache_alloc_trace+0x2cc/0x760 10:19:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={r3, @in6={{0xa, 0x4e24, 0x9, @mcast1, 0x6}}, 0x9, 0x1c}, &(0x7f0000000100)=0x90) [ 699.300269] ? kasan_unpoison_shadow+0x35/0x50 [ 699.304906] ? kasan_kmalloc+0xce/0xf0 [ 699.308864] __memcg_init_list_lru_node+0x8a/0x1e0 [ 699.313831] __list_lru_init+0x402/0x720 [ 699.317921] sget_userns+0x81b/0xd30 [ 699.321663] ? ns_test_super+0x50/0x50 [ 699.325582] ? set_bdev_super+0x120/0x120 [ 699.329757] ? set_bdev_super+0x120/0x120 [ 699.334230] ? ns_test_super+0x50/0x50 [ 699.338227] sget+0x10c/0x150 [ 699.341519] mount_bdev+0xff/0x3c0 [ 699.345196] ? isofs_bread+0xe0/0xe0 10:19:35 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5424, &(0x7f0000000200)) [ 699.348937] isofs_mount+0x35/0x40 [ 699.352518] mount_fs+0xa8/0x31f [ 699.355917] vfs_kern_mount.part.0+0x6f/0x410 [ 699.360463] do_mount+0x53e/0x2bc0 [ 699.364027] ? copy_mount_string+0x40/0x40 [ 699.368303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.373882] ? copy_mount_options+0x280/0x3a0 [ 699.378406] ksys_mount+0xdb/0x150 [ 699.381972] __x64_sys_mount+0xbe/0x150 [ 699.386054] do_syscall_64+0xfd/0x620 [ 699.389880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.395083] RIP: 0033:0x45d35a [ 699.398287] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 699.417204] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 699.424937] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 699.432226] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 699.439511] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 10:19:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = accept4(r0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000140)=0x80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r3, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='westwood\x00', 0x9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @remote}], 0x1c) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x200000) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x4, 0xf784, 0x1, 0xff}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000340)=ANY=[@ANYRES32=r6, @ANYBLOB="3a0000007e3f6bede416aec2fe2b2483380b69f41af909a6bbe0191c5cbd3e854b13129f09d0d18153c392ac0ab11bf08eed57f41a3c0cc484d4d19d45d9"], &(0x7f00000003c0)=0x42) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 699.446800] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 699.454088] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 10:19:35 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5425, &(0x7f0000000200)) 10:19:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, r2, 0x0, 0x0) 10:19:36 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5427, &(0x7f0000000200)) 10:19:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(r1, 0x406, r0) getsockopt$netlink(r2, 0x10e, 0x6, &(0x7f00000000c0)=""/4096, &(0x7f0000000040)=0x1000) 10:19:36 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getpeername$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) 10:19:36 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5428, &(0x7f0000000200)) [ 700.395540] FAULT_INJECTION: forcing a failure. [ 700.395540] name failslab, interval 1, probability 0, space 0, times 0 [ 700.412425] CPU: 0 PID: 32628 Comm: syz-executor.3 Not tainted 4.19.89-syzkaller #0 [ 700.420402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.420410] Call Trace: [ 700.420437] dump_stack+0x197/0x210 [ 700.420463] should_fail.cold+0xa/0x1b [ 700.439966] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.445097] ? lock_downgrade+0x880/0x880 [ 700.449270] __should_failslab+0x121/0x190 [ 700.449289] should_failslab+0x9/0x14 [ 700.457347] kmem_cache_alloc_trace+0x2cc/0x760 [ 700.462817] ? kasan_unpoison_shadow+0x35/0x50 [ 700.467426] ? kasan_kmalloc+0xce/0xf0 [ 700.471335] __memcg_init_list_lru_node+0x8a/0x1e0 [ 700.476311] __list_lru_init+0x402/0x720 [ 700.480397] sget_userns+0x84a/0xd30 [ 700.484129] ? ns_test_super+0x50/0x50 [ 700.488035] ? set_bdev_super+0x120/0x120 [ 700.492195] ? set_bdev_super+0x120/0x120 [ 700.496356] ? ns_test_super+0x50/0x50 [ 700.500263] sget+0x10c/0x150 [ 700.503395] mount_bdev+0xff/0x3c0 [ 700.506961] ? isofs_bread+0xe0/0xe0 [ 700.510693] isofs_mount+0x35/0x40 [ 700.510709] mount_fs+0xa8/0x31f [ 700.510729] vfs_kern_mount.part.0+0x6f/0x410 [ 700.510747] do_mount+0x53e/0x2bc0 [ 700.510767] ? copy_mount_string+0x40/0x40 [ 700.510785] ? _copy_from_user+0xdd/0x150 [ 700.510804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.510816] ? copy_mount_options+0x280/0x3a0 10:19:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/hci\x00') ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f00000000c0)={0x9, "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"}) [ 700.510833] ksys_mount+0xdb/0x150 [ 700.547709] __x64_sys_mount+0xbe/0x150 [ 700.551703] do_syscall_64+0xfd/0x620 [ 700.555546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.560750] RIP: 0033:0x45d35a [ 700.563961] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 700.582959] RSP: 002b:00007f6960be2a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 700.582975] RAX: ffffffffffffffda RBX: 00007f6960be2c90 RCX: 000000000045d35a [ 700.582984] RDX: 00007f6960be2ae0 RSI: 00000000200000c0 RDI: 00007f6960be2b00 [ 700.582993] RBP: 000000000075bf20 R08: 00007f6960be2b40 R09: 00007f6960be2ae0 [ 700.583001] R10: 0000000000000001 R11: 0000000000000202 R12: 00007f6960be36d4 [ 700.583010] R13: 00000000004cadb0 R14: 00000000004e42a0 R15: 0000000000000003 [ 700.631422] kauditd_printk_skb: 25 callbacks suppressed 10:19:36 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5437, &(0x7f0000000200)) [ 700.631435] audit: type=1800 audit(1576318776.915:710): pid=32625 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=82 res=0 10:19:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, r2, 0x0, 0x0) [ 700.725515] audit: type=1804 audit(1576318776.945:711): pid=32625 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/969/file0/file0" dev="loop1" ino=82 res=1 [ 700.738447] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 3 [ 700.760712] [ 700.760719] ====================================================== [ 700.760724] WARNING: possible circular locking dependency detected [ 700.760728] 4.19.89-syzkaller #0 Not tainted [ 700.760733] ------------------------------------------------------ [ 700.760738] syz-executor.0/32640 is trying to acquire lock: [ 700.760742] 00000000486a7b6f (console_owner){-.-.}, at: vprintk_emit+0x3d5/0x6d0 [ 700.760756] [ 700.760759] but task is already holding lock: [ 700.760762] 0000000055f28e04 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x2b/0x570 [ 700.760778] [ 700.760782] which lock already depends on the new lock. [ 700.760784] [ 700.760787] [ 700.760791] the existing dependency chain (in reverse order) is: [ 700.760793] [ 700.760795] -> #2 (&(&port->lock)->rlock){-.-.}: [ 700.760810] _raw_spin_lock_irqsave+0x95/0xcd [ 700.760813] tty_port_tty_get+0x22/0x90 [ 700.760817] tty_port_default_wakeup+0x16/0x40 [ 700.760822] tty_port_tty_wakeup+0x57/0x70 [ 700.760825] uart_write_wakeup+0x46/0x70 [ 700.760829] serial8250_tx_chars+0x495/0xaf0 [ 700.760833] serial8250_handle_irq.part.0+0x261/0x2b0 [ 700.760838] serial8250_default_handle_irq+0xc0/0x150 [ 700.760842] serial8250_interrupt+0xfc/0x1e0 [ 700.760846] __handle_irq_event_percpu+0x144/0x8f0 [ 700.760850] handle_irq_event_percpu+0x74/0x160 [ 700.760853] handle_irq_event+0xa7/0x134 [ 700.760857] handle_edge_irq+0x25e/0x8d0 [ 700.760861] handle_irq+0x39/0x50 [ 700.760865] do_IRQ+0x99/0x1d0 [ 700.760869] ret_from_intr+0x0/0x1e [ 700.760873] native_safe_halt+0xe/0x10 [ 700.760876] arch_cpu_idle+0xa/0x10 [ 700.760880] default_idle_call+0x36/0x90 [ 700.760884] do_idle+0x30c/0x4d0 [ 700.760887] cpu_startup_entry+0xc8/0xe0 [ 700.760891] start_secondary+0x3e8/0x5b0 [ 700.760895] secondary_startup_64+0xa4/0xb0 [ 700.760897] [ 700.760900] -> #1 (&port_lock_key){-.-.}: [ 700.760914] _raw_spin_lock_irqsave+0x95/0xcd [ 700.760918] serial8250_console_write+0x7ca/0x9f0 [ 700.760922] univ8250_console_write+0x5f/0x70 [ 700.760926] console_unlock+0xbdf/0x10d0 [ 700.760930] vprintk_emit+0x280/0x6d0 [ 700.760933] vprintk_default+0x28/0x30 [ 700.760937] vprintk_func+0x7e/0x189 [ 700.760940] printk+0xba/0xed [ 700.760944] register_console+0x77f/0xb90 [ 700.760949] univ8250_console_init+0x3e/0x4b [ 700.760952] console_init+0x4f7/0x761 [ 700.760956] start_kernel+0x59c/0x8c5 [ 700.760960] x86_64_start_reservations+0x29/0x2b [ 700.760964] x86_64_start_kernel+0x77/0x7b [ 700.760968] secondary_startup_64+0xa4/0xb0 [ 700.760971] [ 700.760973] -> #0 (console_owner){-.-.}: [ 700.760986] lock_acquire+0x16f/0x3f0 [ 700.760990] vprintk_emit+0x412/0x6d0 [ 700.760994] vprintk_default+0x28/0x30 [ 700.760997] vprintk_func+0x7e/0x189 [ 700.761000] printk+0xba/0xed [ 700.761005] tty_port_close_start.part.0+0x51a/0x570 [ 700.761009] tty_port_close+0x4e/0xf0 [ 700.761012] tpk_close+0x83/0x95 [ 700.761016] tty_release+0x3ba/0xe90 [ 700.761019] __fput+0x2dd/0x8b0 [ 700.761023] ____fput+0x16/0x20 [ 700.761027] task_work_run+0x145/0x1c0 [ 700.761031] exit_to_usermode_loop+0x273/0x2c0 [ 700.761035] do_syscall_64+0x53d/0x620 [ 700.761040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.761042] [ 700.761046] other info that might help us debug this: [ 700.761048] [ 700.761052] Chain exists of: [ 700.761054] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 700.761085] [ 700.761089] Possible unsafe locking scenario: [ 700.761091] [ 700.761095] CPU0 CPU1 [ 700.761099] ---- ---- [ 700.761102] lock(&(&port->lock)->rlock); [ 700.761111] lock(&port_lock_key); [ 700.761120] lock(&(&port->lock)->rlock); [ 700.761128] lock(console_owner); [ 700.761135] [ 700.761139] *** DEADLOCK *** [ 700.761141] [ 700.761145] 2 locks held by syz-executor.0/32640: [ 700.761147] #0: 00000000955a92b2 (&tty->legacy_mutex){+.+.}, at: tty_lock+0x73/0xb0 [ 700.761164] #1: 0000000055f28e04 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x2b/0x570 [ 700.761181] [ 700.761184] stack backtrace: [ 700.761189] CPU: 1 PID: 32640 Comm: syz-executor.0 Not tainted 4.19.89-syzkaller #0 [ 700.761196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.761199] Call Trace: [ 700.761203] dump_stack+0x197/0x210 [ 700.761207] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 700.761211] __lock_acquire+0x2e19/0x49c0 [ 700.761215] ? debug_smp_processor_id+0x1c/0x20 10:19:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x11}, 0xb866}], 0xffffffffffffffe8) socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r2 = accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x180800) ioctl$SIOCRSACCEPT(r2, 0x89e3) 10:19:37 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5441, &(0x7f0000000200)) [ 700.761219] ? mark_held_locks+0x100/0x100 [ 700.761223] ? SOFTIRQ_verbose+0x10/0x10 [ 700.761227] ? kvm_sched_clock_read+0x9/0x20 [ 700.761231] ? vprintk_emit+0x3ed/0x6d0 [ 700.761235] ? trace_hardirqs_off+0x62/0x220 [ 700.761239] lock_acquire+0x16f/0x3f0 [ 700.761243] ? vprintk_emit+0x3d5/0x6d0 [ 700.761246] vprintk_emit+0x412/0x6d0 [ 700.761250] ? vprintk_emit+0x3d5/0x6d0 [ 700.761253] vprintk_default+0x28/0x30 [ 700.761257] vprintk_func+0x7e/0x189 [ 700.761261] printk+0xba/0xed [ 700.761265] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 700.761269] ? kasan_check_write+0x14/0x20 [ 700.761272] ? do_raw_spin_lock+0xc8/0x240 [ 700.761277] tty_port_close_start.part.0+0x51a/0x570 [ 700.761280] tty_port_close+0x4e/0xf0 [ 700.761284] tpk_close+0x83/0x95 [ 700.761287] ? tpk_write+0x340/0x340 [ 700.761291] tty_release+0x3ba/0xe90 [ 700.761295] ? ima_file_free+0xc9/0x4a0 [ 700.761299] ? tty_release_struct+0x50/0x50 [ 700.761302] __fput+0x2dd/0x8b0 [ 700.761306] ____fput+0x16/0x20 [ 700.761309] task_work_run+0x145/0x1c0 10:19:37 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5450, &(0x7f0000000200)) 10:19:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000200)) r4 = open(0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r6, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000300)={@remote, r9}, 0x14) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r9}) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r10, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000000)=r1, 0x4) [ 700.761313] exit_to_usermode_loop+0x273/0x2c0 [ 700.761317] do_syscall_64+0x53d/0x620 [ 700.761322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.761326] RIP: 0033:0x4144a1 [ 700.761337] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 700.761341] RSP: 002b:00007fff9d2209e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 700.761351] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004144a1 10:19:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 700.761356] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000003 [ 700.761362] RBP: 0000000000000000 R08: 00000000007601c0 R09: ffffffffffffffff [ 700.761367] R10: 00007fff9d220ab0 R11: 0000000000000293 R12: 000000000075bf20 [ 700.761372] R13: 0000000000000003 R14: 00000000007601c8 R15: 000000000075bf2c [ 700.813706] audit: type=1800 audit(1576318776.945:712): pid=32625 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=82 res=0 [ 700.821810] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 701.439950] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 701.447101] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 701.450757] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 701.455564] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 701.510765] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 701.517331] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:19:37 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:37 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5451, &(0x7f0000000200)) [ 701.551005] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 701.568800] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 701.585323] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 701.598377] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 701.603850] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 701.608911] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 701.623129] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 701.640186] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env 10:19:37 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5452, &(0x7f0000000200)) [ 701.646960] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 701.655169] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:19:38 executing program 4: r0 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f00000000c0)={0x90b3fa1993abbda3, "19d79b86d7c00acbbd7324d843608ddd7090a6446fa83cc48b8c77ca73e64f3ffef73c7e65bc6611a089f9dde00532e951448939ab9bcd1b0785fe0985137512", {0x4000000000000, 0x32c5}}) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 701.711446] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 701.724986] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 701.731684] audit: type=1800 audit(1576318778.005:713): pid=32666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17285 res=0 [ 701.758841] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 701.769391] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 701.789922] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 701.800063] audit: type=1804 audit(1576318778.015:714): pid=32666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/970/file0/file0" dev="sda1" ino=17285 res=1 10:19:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4e200, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) sendfile(r1, r2, 0x0, 0x0) 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x545d, &(0x7f0000000200)) [ 701.858911] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 701.894111] ISOFS: Unable to identify CD-ROM format. [ 701.901937] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env 10:19:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x688001, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 701.915932] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 701.928335] audit: type=1800 audit(1576318778.015:715): pid=32666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17285 res=0 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5460, &(0x7f0000000200)) [ 701.966179] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 701.967202] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 701.975200] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 701.988695] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x40049409, &(0x7f0000000200)) [ 702.059226] audit: type=1800 audit(1576318778.335:716): pid=32662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17273 res=0 [ 702.094115] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:38 executing program 5: socket$inet6_sctp(0xa, 0x801, 0x84) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x40}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x1, @mcast1, 0xc2c}}, 0xffffffb9, 0x101, 0x6, 0xe00, 0x2}, &(0x7f0000000100)=0x98) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4$nfc_llcp(r1, &(0x7f0000000280), &(0x7f0000000340)=0x60, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0xffffffffffffffff, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) bind$rxrpc(r1, &(0x7f0000000400)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x29}, 0x81}}, 0x24) fchown(r3, r5, r6) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3, @local, 0x3}]}, &(0x7f0000000180)=0x10) [ 702.127442] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x40086602, &(0x7f0000000200)) [ 702.206043] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 702.214375] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 702.230078] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 702.248544] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 702.281687] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 702.311701] audit: type=1800 audit(1576318778.595:717): pid=32696 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17259 res=0 [ 702.352295] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 702.403939] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 702.405516] audit: type=1804 audit(1576318778.645:718): pid=32696 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737931128/syzkaller.qhAyQQ/971/file0/file0" dev="sda1" ino=17259 res=1 [ 702.410425] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 702.419543] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.452406] audit: type=1800 audit(1576318778.645:719): pid=32696 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17259 res=0 [ 702.473508] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 702.487458] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 702.494001] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x40087602, &(0x7f0000000200)) 10:19:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000180)={0x0, 0x0, 0xb0, "6f4fb629094004db5589f4cfb7bd788e2031862c0fd3f20fb82786e09534cac36a7c892a4548c555a6768a53778dad09daf81dcf94ac8fb0436838888294bd7d3dff9fa23e5d8443a2d26d6cff3e665123263182ceae09004b929d0b14526dda985ff84aaa986364a46ccadff220c89faf944e503ac67c276a2a5115d2f1a414b4d3e431d5bf542b9bfe8df3e49ac9b76a899a3ad7fe75d8d360a0c729ad3cf5670ae0a0b9a803bdfa7ea1bca186e374"}, 0xb8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000000)=0x10) 10:19:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='jso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000000541b05a1bdc06c76be88ebe192274214cf051fd2be5ab1245b30b1021d2918150b6245f6188e8837ec3618fb7897e5e12114", @ANYRES32=0x0], &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={r5, 0xfffffff7}, &(0x7f00000000c0)=0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000200)) r4 = open(0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r6, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000300)={@remote, r9}, 0x14) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r9}) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r10, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000000)=r1, 0x4) [ 702.504280] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 702.529335] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 702.542653] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x4020940d, &(0x7f0000000200)) [ 702.543374] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 702.549340] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 702.567855] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 702.573605] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 702.581828] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:19:38 executing program 5: bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x804000}, 0xc) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x7}, &(0x7f00000002c0)=0x8) r4 = socket(0x10, 0xdcadcddb79b146bb, 0x1f) sendto(r4, &(0x7f0000000380)="17ad6cfb73c51f149b5b6e3c812cfe7fb759028cd6037d308e61dc703ee076f3", 0x20, 0x200410c2, &(0x7f00000003c0)=@ipx={0x4, 0x8, 0x7315, "c488b18bec9c", 0x40}, 0x80) r5 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000300)={r3, 0xfffffffe, 0xffffffff, 0x3}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000540)=0x4) ioctl$KVM_GET_MSRS(r8, 0xc008ae88, &(0x7f0000000480)=ANY=[@ANYBLOB="0900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000dd000000000000b900000000000080000000000000a60000000000000000000000000000000000000600"/152]) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f00000001c0)=""/227) 10:19:38 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x80045432, &(0x7f0000000200)) [ 702.599321] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.616224] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.623402] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 702.629365] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 702.678801] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 702.714729] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:19:39 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x80045440, &(0x7f0000000200)) [ 702.741023] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.745382] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 702.759077] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 702.774013] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 702.785702] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 702.797923] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.804687] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 702.822485] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:19:39 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x80086601, &(0x7f0000000200)) [ 702.835659] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.859719] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 702.893675] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.908253] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='is\"9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 702.941977] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 702.965404] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:39 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x80087601, &(0x7f0000000200)) [ 703.018141] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.054141] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.078497] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.096138] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:39 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0xc0045878, &(0x7f0000000200)) 10:19:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000000)=""/89) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) openat(r4, &(0x7f0000000100)='./bus\x00', 0x1, 0x40) [ 703.213435] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.224045] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.271960] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.278844] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.289110] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.296338] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.307346] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 703.314765] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 703.341115] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 703.355669] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 703.371249] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.377985] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x480, 0x0) [ 703.424749] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.446008] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.479137] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.486165] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.502064] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 703.512729] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 703.535246] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 703.554600] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' 10:19:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x5, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000240)={0x28, 0x2, 0x0, {0x6, 0x9, 0x2}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in={{0x2, 0x4e20, @broadcast}}, 0xc7ff}, 0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e24, @empty}}, 0x3, 0x20}, &(0x7f0000000040)=0x90) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 703.627282] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 703.634312] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000200)) r4 = open(0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r6, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000300)={@remote, r9}, 0x14) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r9}) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r10, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000000)=r1, 0x4) 10:19:39 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0xc0045878, &(0x7f0000000200)) 10:19:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='is,9660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:40 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0xc0189436, &(0x7f0000000200)) [ 703.721469] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.745538] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x4, [0x0, 0x5, 0x17, 0x8]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1ef, &(0x7f00000000c0)}, &(0x7f0000000180)=0xae) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000003c0), 0xffffffffffffdfe, &(0x7f0000000580)=""/187, 0x3dc}, 0x80018100) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000500)=@assoc_value, &(0x7f0000000540)=0x8) 10:19:40 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0xc020660b, &(0x7f0000000200)) [ 703.790322] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 703.816894] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 703.873972] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 703.880765] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.907712] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e22, 0x2, @rand_addr="90d3b3639757d94d56886b5b44558cf8", 0xfffffffe}}, 0x76e, 0x5}, 0x90) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @remote}], 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r6, 0x31, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}]) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000200)=0x30) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) eventfd2(0xfffffc01, 0x80801) [ 703.932666] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 703.959761] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 703.969807] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env 10:19:40 executing program 0: r0 = open(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x1, 0x40000000000004d, 0x2}], 0x90) ppoll(&(0x7f0000000380)=[{r1}], 0x1, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x9828a290}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x1c, r2, 0x70a, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x4000400) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) setsockopt$inet6_buf(r4, 0x29, 0x1b, &(0x7f0000000500)="3c4f3cd92654c71245d9fa38cad47c03a2dc01e9292b436f90f03be4997d16a47553f44df15edb7215f6ed2fc7295cd7226fef8110412a32f080b4c2c1a2ec3fc122089124ed2ba50e1bbaa96e1dc88353f640cb1a6a250b1902544a2dc637d98eb718e36d2a5e3193e16acf6ce053233ecd82354046fafb6ff53035ccda93088c851dc5c2f7930d75635db4967705838a307c77f6dbc5f1c41904842bf8b914a4f9b7dd3c635e86c0867f5b299ea5", 0xaf) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setitimer(0x3, &(0x7f00000002c0)={{r8, r9/1000+30000}}, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) r10 = socket$unix(0x1, 0x1, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1, 0x0, 0x26b83563a4734d57) [ 703.987581] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 703.998109] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 704.012408] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.019206] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.049305] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.058018] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso:660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000200)) r4 = open(0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r6, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000300)={@remote, r9}, 0x14) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r9}) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r10, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000000)=r1, 0x4) [ 704.181445] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.188123] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.252722] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.277273] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.290401] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.298952] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.338840] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 704.366958] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 704.402538] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.412349] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.446919] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.473880] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.480876] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.490073] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.551082] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 704.557816] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 704.570764] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.580175] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.604476] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.616995] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.642877] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='isod660\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r9, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 704.653713] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.694137] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x8, 0x401, 0x2, 0x7, 0xff, 0x0, 0x1f, 0x800, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) [ 704.708826] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.748779] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 704.759255] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 704.771455] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 704.778010] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 704.780943] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000300)={@remote, r3}, 0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)=@newqdisc={0x204, 0x24, 0x200, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0xf, 0xfff2}, {0xc, 0x8019}, {0x6, 0x8}}, [@TCA_STAB={0x2c, 0x8, [{{0x1c, 0x1, {0x6d, 0x8, 0x1, 0x5, 0x2, 0x8, 0x20, 0x4}}, {0xc, 0x2, [0xea, 0x4, 0x8, 0x2]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x9}, @TCA_STAB={0x188, 0x8, [{{0x1c, 0x1, {0x8, 0x7, 0x20, 0x6, 0x2d835504f2404b18, 0x7, 0xffffffcb, 0x7}}, {0x14, 0x2, [0x7, 0xfeff, 0x2, 0x7, 0x9, 0x5, 0x9]}}, {{0x1c, 0x1, {0x8, 0x40, 0x40, 0x7, 0x0, 0x11, 0x101, 0x2}}, {0x8, 0x2, [0x1, 0x7]}}, {{0x1c, 0x1, {0x8, 0x7, 0xf7, 0x4, 0x1, 0x1, 0x2, 0x4}}, {0xc, 0x2, [0x2, 0x8000, 0x401, 0x0]}}, {{0x1c, 0x1, {0x20, 0x40, 0x8, 0xad5, 0x1, 0x6, 0x7, 0x7}}, {0x14, 0x2, [0x401, 0x8f, 0x20, 0x5, 0x7fff, 0xfff9, 0x2]}}, {{0x1c, 0x1, {0x80, 0xc1, 0x8001, 0x5, 0x2, 0x2, 0x6, 0x9}}, {0x18, 0x2, [0x7, 0x57, 0x1, 0x6, 0x80, 0x2, 0x5, 0x7, 0x6]}}, {{0x1c, 0x1, {0x4, 0x4, 0x8, 0x1, 0x82cd49de96ca43cd, 0x36d, 0x100, 0x3}}, {0xc, 0x2, [0xfff, 0x9, 0x9]}}, {{0x1c, 0x1, {0x20, 0x6, 0x80, 0x9, 0xa147036b18320459, 0xffffffc1, 0x7, 0x1}}, {0x8, 0x2, [0x9]}}, {{0x1c, 0x1, {0x0, 0x3f, 0x8ab3, 0x9, 0x2, 0x9c7, 0x71, 0x8}}, {0x14, 0x2, [0x8d7, 0x200, 0x4, 0x3, 0x0, 0xdf2, 0xbd, 0x7]}}, {{0x1c, 0x1, {0xfe, 0x81, 0x3, 0x1000, 0x2, 0x4, 0x4, 0x4}}, {0xc, 0x2, [0x9, 0x9, 0x9, 0x7fff]}}]}, @TCA_RATE={0x8, 0x5, {0x0, 0x40}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 704.841826] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 704.906088] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.918753] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 704.931804] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:41 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1c5000, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x800c012) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)) [ 704.947563] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:41 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x4000, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x24002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xeb48) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x1882) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0xee, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) 10:19:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x82800, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f00000000c0)=0xffffe4a1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 704.994979] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 705.042149] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 705.064384] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 705.068437] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env 10:19:41 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) [ 705.085059] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 705.093579] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 705.121150] kobject: 'loop5' (000000009027584b): kobject_uevent_env 10:19:41 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x144080, 0x3c8) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000040)={0xa00, 0x280, 0x660, 0x1000, 0x6, 0xffffffff, 0xf, 0x2, {0x1ff, 0x400}, {0x7, 0x9, 0x1}, {0x5, 0x5}, {0x3, 0x7ff}, 0x2, 0x100, 0x8f, 0x3e9f, 0x0, 0x0, 0x9, 0x5, 0x8, 0x3f, 0x3, 0x7, 0x4, 0x4, 0x0, 0x9682a4481dded639}) [ 705.133662] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:19:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r9, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 705.176618] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 705.183680] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 705.197746] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 705.214777] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:41 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)) syz_open_dev$vcsu(&(0x7f0000000080)='?d\x1b\xbf\x00\x00\x00\xe3\x00', 0xe2dd, 0xc0132f18f694ee4e) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0xaa67, 0x4) [ 705.235682] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 705.251022] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 705.279045] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 705.300226] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 705.325595] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 705.343505] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 705.363814] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 705.376611] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 705.678959] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 705.688760] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 705.714104] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 705.723920] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 705.735290] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 705.745058] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:19:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9\b60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000140)={0x4, 0xb2498648cc121b82, 0x2, 0x3, 'syz1\x00', 0xeb}) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000000c0)={{0x1, 0x1}, {0x80, 0x20}, 0x80000000, 0x4, 0x7f}) 10:19:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r9, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000000)=0x10) 10:19:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="0c63f562d6d6a6cdcc108439b43ab80f", 0x3}]}, &(0x7f0000000180)=0x10) [ 705.895364] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 705.930725] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 705.983381] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 705.999860] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 706.031312] kobject: 'loop5' (000000009027584b): kobject_uevent_env 10:19:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)}, &(0x7f0000000180)=0xd0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x2000) ioctl$SNDRV_PCM_IOCTL_PAUSE(r1, 0x40044145, &(0x7f0000000040)=0xffff) [ 706.056989] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 706.073633] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.080157] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.093515] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 706.114009] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 706.159425] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.185331] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 706.200399] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @broadcast}], 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffe, 0x0, @local, 0x3}]}, &(0x7f0000000000)=0x10) [ 706.206852] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 706.234235] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.248565] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r9, &(0x7f0000000340)=""/108, 0x6c, 0x80000002, &(0x7f00000003c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 706.269156] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.283460] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9\"60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) 10:19:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r4, 0xffff}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 706.367755] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 706.379740] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 706.380719] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.401649] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.407460] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 706.450810] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 706.479382] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.482892] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.502824] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.502884] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 706.581886] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.589742] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.596168] kobject: 'loop5' (000000009027584b): kobject_uevent_env [ 706.646533] kobject: 'loop5' (000000009027584b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 706.649517] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.692821] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.697531] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.755379] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.793966] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env 10:19:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9$60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 706.819607] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 706.840468] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.847191] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.867543] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 706.873713] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.874992] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 706.894416] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.943610] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.957141] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 706.963796] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 706.980436] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:43 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 707.041138] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.047724] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.080230] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 707.094161] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.101324] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 707.115197] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.128859] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 707.149109] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 707.194494] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$9p(r1, &(0x7f00000000c0)="9c8ea3c33c5f3fe1e3055f5601cc8cb46c4c3c23956f627fdaaa6eca2fe5d2ce29921cb281a60cb9b018e21fd7b3533906749012aff34d96a948a7bb091bc4db9c039f92c13d", 0x46) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @loopback}], 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x4}, 0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9&60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 707.277317] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.297335] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 707.310947] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.319738] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.338863] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 707.375455] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.398693] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.408764] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.433163] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 707.491954] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 707.526611] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 707.574702] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 707.581338] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.600732] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x1, @rand_addr="bf59f4e4353972152ce011f8ea2a9b62", 0x9}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x7, @rand_addr="0ac11a634f6f0d17440d28873a42d4ba", 0x1}, 0x11e) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 707.631058] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 707.656019] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.669942] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.684235] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.721840] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.738971] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 707.768847] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:44 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9(60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 707.814735] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.838728] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.860715] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.869731] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.874900] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 707.934402] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 707.956882] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 707.966088] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 707.981205] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.997291] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.026507] kauditd_printk_skb: 8 callbacks suppressed [ 708.026519] audit: type=1800 audit(1576318784.305:728): pid=443 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16885 res=0 [ 708.060441] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 708.083123] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 708.113702] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 708.130924] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.158769] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.174204] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r3 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000180)={0x0, 0x1, 0x1, 0x0, 0x0, [], [], [], 0x4000000, 0x8}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 708.177402] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.196555] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.215097] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 708.229502] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 708.264214] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 708.287967] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:44 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9*60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 708.319939] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.346598] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.393786] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.402826] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.456091] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 708.475277] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 708.506996] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.513978] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.523619] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.533890] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.571092] audit: type=1800 audit(1576318784.855:729): pid=464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16882 res=0 10:19:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x7ff, 0x7, 0x1a7e, 0x7, 0xff, 0x0, 0x57}, 0xc) [ 708.630758] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.648496] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.666681] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.679781] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.703009] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.707448] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 708.729498] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.743820] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x366dd07d, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1aa) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 10:19:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 708.806132] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 708.813709] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 708.836865] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:45 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9,60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 708.865767] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.890852] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 708.897425] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000300)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x8, 0x2, 0x400, 0xfffffffb, 'syz1\x00', 0x33accbe6}, 0x3, 0x2, 0x100, r4, 0x3, 0x9, 'syz1\x00', &(0x7f00000000c0)=['\x00', ')@ppp1\f\'ppp0!:-\xcf(\x00', '*\x00'], 0x15, [], [0x4080, 0x6, 0x6, 0x3]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 708.918153] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 708.937911] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 708.961194] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 708.967921] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 709.028285] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 709.061805] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:19:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 709.071763] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.113085] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 709.129737] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.145655] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 709.188896] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.196208] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.211550] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 709.218659] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 709.229002] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 709.245351] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 709.259633] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.283333] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 709.336576] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.338019] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 709.356309] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.375086] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:19:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) prctl$PR_SET_THP_DISABLE(0x29, 0x1) [ 709.386647] audit: type=1800 audit(1576318785.675:730): pid=485 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16849 res=0 [ 709.442792] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.467298] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:45 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9.60\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 709.499788] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.531121] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.554158] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.562260] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 709.565356] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.583288] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:19:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 10:19:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c729e0500000000000030303088d5955d94431051a5eaec3adf5e97fcf532405788a386fe4d436a18d4bddb22ce3024ef23a62e5b", @ANYRESDEC]) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) [ 709.612310] kobject: 'nullb0' (00000000184b418e): kobject_uevent_env [ 709.619023] kobject: 'nullb0' (00000000184b418e): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 709.645788] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_wait(0xffffffffffffffff, &(0x7f0000000200), 0xc8, 0x80) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept$inet6(r2, 0x0, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)={0x1, [0x0]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, 0x3, 0x1, 0x9e, 0xb, 0x4d}, 0x98) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x3) [ 709.670809] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.685654] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.705534] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.740215] kobject: 'loop4' (00000000ecd0f0ad): kobject_uevent_env [ 709.769733] kobject: 'loop4' (00000000ecd0f0ad): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 709.824841] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 709.844835] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.856784] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 709.883923] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 709.929938] kobject: 'loop2' (00000000fde5eb0e): kobject_uevent_env [ 709.933794] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 709.939688] kobject: 'loop2' (00000000fde5eb0e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 709.969282] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.017957] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env 10:19:46 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9060\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@map_acorn='map=acorn'}]}) [ 710.061723] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 710.121325] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.137197] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.138562] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.153950] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.191194] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.197766] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.214610] kobject: 'loop1' (00000000f7c80e5a): kobject_uevent_env [ 710.239930] kobject: 'loop1' (00000000f7c80e5a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 710.253184] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.276657] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.390862] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.407253] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.458967] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.473660] kobject: 'loop3' (00000000d48a08ef): kobject_uevent_env [ 710.489169] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 710.502238] kobject: 'loop3' (00000000d48a08ef): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0xfffc, 0x0, @local, 0x3}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000300)) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x100) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000300)={@remote, r8}, 0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'netpci0\x00', r8}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 710.576527] kobject: 'loop3