rogram 2: 09:51:11 executing program 4: 09:51:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8971, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:11 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:11 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r2}) writev(0xffffffffffffffff, &(0x7f0000000700), 0x10000000000000ea) 09:51:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:11 executing program 2: 09:51:11 executing program 4: 09:51:11 executing program 4: 09:51:11 executing program 2: 09:51:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8992, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:20 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:20 executing program 2: 09:51:20 executing program 4: 09:51:20 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:20 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r2}) writev(0xffffffffffffffff, &(0x7f0000000700), 0x10000000000000ea) 09:51:20 executing program 2: 09:51:20 executing program 4: 09:51:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:20 executing program 4: 09:51:20 executing program 2: 09:51:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8995, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:31 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:31 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:31 executing program 4: 09:51:31 executing program 2: 09:51:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:31 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r2}) writev(0xffffffffffffffff, &(0x7f0000000700), 0x10000000000000ea) 09:51:31 executing program 4: 09:51:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:31 executing program 2: 09:51:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:31 executing program 2: 09:51:31 executing program 4: 09:51:40 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:40 executing program 2: 09:51:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000000)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0), 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 09:51:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b1, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:40 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:40 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U-'}, 0x28, 0x1) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x7}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000420}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r2, 0x2, 0x70bd29, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x10) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000300)={0x94, "1baf9d264e07f22e75df3995c78f520eec7adcb12a0d3a29b1bbe59a3cb80c70af731a80acdc793d63bbe1c14e3a80a488395b8e33df0381ce1a894e5eaceefdbd6193b05eb5498527432c464fa78eae54e6e98a1d13bb4444c8c882b204a7c3ceb7c79875a03e10b84f973d312c93c55e531412137afb95935158530491c335ea3bcaaaddf2b821c42c1ba31fba2bf4695b8720"}) 09:51:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae00, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffffc, 0x2) sendmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="616a961535c467523e47d7e88ff6eb031ade3fccb6e90cf082a11b8fb1ed544a1cec5d2480bcd6653673639269fe9c9bc97eb57299ad122b262ea586ec9c107034db732082517fad3d480102fd5bf73ebfd45e732018ed188abaa835314daf3e31f74ee66b214df433c9ec1bc9b39bc9fc6d44c97d9df53d453bf73cfd08e73ea2bc98034a9a1cd4c7e99fef8732629621f273b90fc672143315c68cfc1508c3c352b6c1e471312f607fc2328bffb8c186fd64008864c6223120facdaec933780026fbf0daabeb9ac4c4a342a15b0b897c648f9d46e8fc6955aec492c25a96b9cd3c48", 0xe3}, {&(0x7f0000000100)="d95b71d52ac23a4c2a4955c168867cb2d2d003d3d6b26708b760630aa1817a16c4d529fc26a98d5265a5006d4ef42ee3cada95e9788d232183cf7de6a01bc49f7510503c88bd66a7d5dfeefcec972b5d8a186d804d0319e46f8eba0ecf1edc69957c", 0x62}, {&(0x7f0000000000)="24f8ec3bb16cf439926f0e940ad62c6162035dafc915b839a53f1ff77f8d97bf1b236d4dfbc8e5af1291e39696094a6f5ad8", 0x32}], 0x3, &(0x7f0000000300)=[{0x90, 0x102, 0x77, "7f94fe9d89719d486237b6765c6ccbce86b1130b670379d06da20da00cc63ee64e9bc32dfcb18268f0ce5c7ff68d5097cb18197103e8157a1a8d7d929dd53d0400a1fd778eddf9af47f3f7aecf8240ff31d48b97a9563f9241057a7897429db910f1024fe49d7fa07e6c2544ec82d813f6fabdb077ccf618ff0d7d87"}, {0x68, 0x100, 0xfffffffffffffff7, "67e16a602ce14fab356d0406cabb332ebc32ad8320fda89473a6893488ed2981f0fd049a731dc21cc8d652a8b068d48e039b3591f5a7c7a8f8f5b1a720d844f471d7ecabd9c78f2e24ebab682fcf9c1b02096f56d760d3"}, {0x100, 0x109, 0xff, "8e4c0f7920a927700878b869e7250930ce6748cd096cdcd859756bd96d1b8dae04c0715a552d4b691ba56fd265e4becbb3b763b4a56dcecbe2a952cb3b61edf0868f252bc66f73189b4a015ff4ff69d3121b51b2c07a6c617eb3e26d702ddff8b782bbd7d8cc790208893b1a4b75fdf9e210cc76b9222f86643722b99cc9f9a108778facac0829b525fac51236544185f09e55a46c450b9ef6b37e377430f6a064d4a0b957edc53a7e9e20b8ed5358bc164bc6a5134e770e5f12533897bd5a79967f895356590568e3ca41bb66ca77676773cf8f97478b119ed3f9be96f78a18e864c5ab9b7faa5db95f803c4e96f352"}, {0x110, 0x3a, 0x4, "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"}], 0x308}, 0x4001) r2 = dup(r1) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000180)=0xbe) write$FUSE_ATTR(r2, &(0x7f0000000040)={0xffffffffffffff09}, 0xfddf) 09:51:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae01, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:40 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae41, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:49 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r2 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@rand_addr=0x3d3a, 0x4e23, 0xe3d8, 0x4e20, 0x0, 0x2, 0x0, 0x80, 0x3fbfbc072344a481, r1, r2}, {0x6, 0x4d, 0x6, 0x0, 0x0, 0x5, 0x1000, 0x1}, {0x1, 0x0, 0x4, 0xfffffffffffffff7}, 0x7, 0x0, 0x2, 0x0, 0x1}, {{@in6=@empty, 0x4d5, 0x33}, 0x2, @in6=@loopback, 0x3503, 0x1, 0x0, 0x4, 0x6, 0x3, 0x2b}}, 0xe8) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) close(r3) 09:51:49 executing program 4: r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x1, 0x529) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x10000007e, 0x40000004, 0xffffffffffffffff, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x8, 0x0, 0x1, 0x99f2}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000080)={0xffffffff, r3, 0x0, 0x2}) setpriority(0x1, r0, 0x5) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x240, 0x0) getpgid(r0) 09:51:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae60, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:49 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:49 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="950620989f316bc8bf8f68136ea1", 0x0}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x52f1, 0x101080) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000140)="5fb165", 0x3) 09:51:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) mknod$loop(&(0x7f0000000340)='./file0\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, @in6={0xa, 0x4e24, 0x0, @mcast2}]}, &(0x7f00000000c0)=0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x140) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@dev, @local, 0x0}, &(0x7f00000001c0)=0xc) connect$packet(r2, &(0x7f0000000200)={0x11, 0xf7, r3, 0x1, 0x7fffffff, 0x6, @link_local}, 0x14) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000300)=0xb27) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000380)=@netrom={'nr', 0x0}, 0xfffffffffffffe06) getsockopt$inet_dccp_int(r4, 0x21, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000080)={0x4, 0x9, 0x80000000, 0x9, 0x12, 0x57a82c45, 0x5, 0x5, 0x80}) 09:51:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae78, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae80, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:49 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) fcntl$notify(r3, 0x402, 0x10000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x5e350f671742784b) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000440)={0x3, 0x7f, 0x4, 0x1000, 0x100, 0x6, 0x1, 0x7f, 0x4, 0x6, 0x24}, 0xb) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000002c0)) close(r3) 09:51:59 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r1 = accept(r0, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f00000002c0)=0x80) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={r0}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'rose0\x00', {0x2, 0x4e22, @rand_addr=0x5}}) getpriority(0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x28200, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="000400ff0100"/22], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 09:51:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xae9a, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:51:59 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x400000, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @remote}, 0x0, 0x3, 0x4, 0x3}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000300)="d3fcae9e7517b4bfa9dfc57d2c6045e323a0dcb9fa01b6698aea05e62faf57ff1989c361a5c6a25b121aa41e70867a3a19acbc9e0bde43a6f8d4547058e684e3c8c4a33fdf3aaa8acb55571df3d7d8e8f62cc1931121364d7b73b43b1a5595b6e3a5a87fa8d2f2d66d2fbc7c764e4cf8538ea673d41e76eefc37f944008b63a6d41fce942eecf5544bcb54e77fcfc361b9bc34e56088c77a0f0928c6298265e0708c1a6cda95ee0e78b6638e4145bf62e8067b7807202bae8e367b41108c548dfe6d36c649f4", 0xc6}], 0x1, &(0x7f0000000440)=[{0x28, 0x0, 0x10001, "8fab8de2bbdd3804ef3b6161b81a83386504cf217d5a81dc"}, {0x88, 0x115, 0x3cba, "40d5b9d1baec1aa875c28e7a83c211954056e2ebc2620594815efc46f9fb902f501362eca1edd4c1b5aff107f0b1d0bcd8d49032b2e94b4e7b3c7c5f4001d6ef0024b0dca843296e29501aeeb3161779ac6477c1e9a08fdf765afe4b4543c7d8b2b05bd44ce94e6ebc570c8afca1f0ca19"}], 0xb0}, 0x4040004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x80080) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000040)=0x1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PLL_GET(r5, 0x80207011, &(0x7f0000000540)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r8, 0x0, r8, 0x0, 0x100000000ffe0, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r5, 0x0, r7, 0x0, 0x100000000000a, 0x0) 09:51:59 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:51:59 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:51:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xaf01, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x400454ca, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa5) 09:52:00 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80840, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)={0x71, 0x6f, 0x2, {0x8, [{0x604705aad3037e7a, 0x3, 0x3}, {0x81, 0x3, 0x4}, {0x8, 0x3, 0x1}, {0x0, 0x4, 0x6}, {0x9, 0x3, 0x6}, {0x8, 0x0, 0x5}, {0x10, 0x1, 0x1}, {0x80, 0x3, 0x3}]}}, 0x71) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300090468fe07002b0000000000ff0711000000450001070000001404001a000b00020005000100550e00"/57, 0x39}], 0x1) [ 884.706467][T13502] __nla_validate_parse: 36 callbacks suppressed [ 884.706477][T13502] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 884.726996][T13503] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. 09:52:13 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:52:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4004af61, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:13 executing program 2: setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=0x0, &(0x7f0000000440)=0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000480)={r3, 0x4}, 0x8) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1e0, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbfb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbf5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6e}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffda522449}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffe0}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x10}, 0x810) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xac) r4 = socket$kcm(0x10, 0x2, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000040)={0x400, 0x566, 0x3}) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e00000013001707ed12806cd200a26838cce973066510e533fb0d61e18fbd2fe6a5dd80009d0001080100000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 09:52:13 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_uring_setup(0xf43, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/.api20\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xec, r1, 0x10c, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x354a}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x28}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffff361}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x4000040}, 0x41) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) ptrace$peek(0x3, r2, &(0x7f00000002c0)) 09:52:13 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4008ae89, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {}, {r0}, {}, {}, {}], 0x6, 0x400080000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x4}, 0x0) shutdown(r1, 0x0) 09:52:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0xfc, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) utime(&(0x7f00000008c0)='./file0\x00', 0x0) 09:52:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4008ae8a, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:13 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:13 executing program 4: mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/20, 0x14}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}, {0x0}], 0x2}, 0x0) shutdown(r1, 0x0) 09:52:20 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4008ae90, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:20 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff46, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x54, &(0x7f0000000140)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) recvfrom$inet(r1, 0x0, 0x101c7, 0x6, 0x0, 0x800e00520) shutdown(r1, 0x0) 09:52:20 executing program 2: mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/20, 0x14}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}], 0x1}, 0x0) shutdown(r1, 0x0) 09:52:20 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4008af03, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4008af13, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x401070c9, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:20 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {r0}], 0x2, 0x400080000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x5}, 0x0) shutdown(r1, 0x0) 09:52:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff46, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) accept$inet(r1, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x101c7, 0x6, 0x0, 0x800e00520) shutdown(r1, 0x0) 09:52:27 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:27 executing program 0: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffff800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:27 executing program 4: 09:52:27 executing program 2: 09:52:27 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:27 executing program 4: 09:52:27 executing program 2: 09:52:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4020ae46, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:27 executing program 4: 09:52:27 executing program 2: 09:52:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40284504, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:40 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:40 executing program 0: socket$inet6(0xa, 0xa, 0xfffffffffffff800) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:40 executing program 4: 09:52:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4028af11, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:40 executing program 2: 09:52:40 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:40 executing program 2: 09:52:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40345410, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:40 executing program 4: 09:52:40 executing program 2: 09:52:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4040ae77, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:40 executing program 4: 09:52:49 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:52:49 executing program 0: socket$inet6(0xa, 0xa, 0xfffffffffffff800) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:49 executing program 2: 09:52:49 executing program 4: 09:52:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4090ae82, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:49 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:49 executing program 2: 09:52:49 executing program 4: 09:52:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4138ae84, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:49 executing program 2: 09:52:49 executing program 0: socket$inet6(0xa, 0xa, 0xfffffffffffff800) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:49 executing program 4: 09:52:56 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:52:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x800454d2, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:56 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0), 0x1000000000000164, 0x0, 0xfffffffffffffdec}, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/20, 0x14}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}], 0x1}, 0x0) shutdown(r1, 0x0) 09:52:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff46, 0x0, 0x0, 0x800e005de) shutdown(r0, 0x0) recvfrom$inet(r1, 0x0, 0x101c7, 0x6, 0x0, 0x800e00520) shutdown(r1, 0x0) 09:52:56 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:56 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:52:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x80086301, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8090ae81, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8138ae83, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:52:56 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:52:56 executing program 4: mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/20, 0x14}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}], 0x1}, 0x0) shutdown(r1, 0x0) 09:52:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {}, {r0}, {}], 0x4, 0x400080000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x5}, 0x0) shutdown(r1, 0x0) 09:53:03 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:03 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/129, 0x81}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/41, 0x29}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1}, 0x0) r6 = dup(r5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r7, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r6, 0x0) r8 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r8, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/156, 0x9c}, {0x0}, {0x0}], 0x3) shutdown(r7, 0x0) shutdown(r4, 0x0) r9 = dup(r2) shutdown(r9, 0x0) 09:53:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x200000000010, 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7c7, 0x40000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f00000001c0)={0x3, 0x200, 0x8, 0xfffffffffffffffd, [], [], [], 0x1, 0x9, 0xd255, 0x50000, "c99afb9a98fe3122c16a8393cea79bbd"}) write(r1, &(0x7f0000000180)="2400000026007f000000000000007701000010ff010000000000e119ffffffff0120ff10", 0x24) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r4 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='/dev/midi#\x00', 0xfffffffffffffff8) keyctl$instantiate(0xc, r3, &(0x7f0000000100)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', '/dev/midi#\x00', 0x20, 0x9, 0x20, [0x32, 0x63, 0x63, 0x31, 0x31, 0x36, 0xcb75bb194e1b1b00, 0x64]}, 0x3f, r4) 09:53:03 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:03 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0xb5be9c95f763fbca, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x38003c5656242a48) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 09:53:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc008ae05, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x401, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e23, 0x1000, @loopback, 0x3}}, 0x1000, 0x6, 0x7, 0x9, 0x44}, &(0x7f0000000300)=0x98) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f00000003c0)={0x7, 0xb000, "14c89f80e9f4e4c7aa069a7d66c261bc308403611820c6c4", {0x2, 0x6}, 0x3}) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x89) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x600081, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r4, 0xc018620c, &(0x7f0000000100)={0x3}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffffffffffffa0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="32000000000000000000983ef7d16f539d770000cd7f4b5c039d96fbaa981f7aa5a3de313db5973b291bd5592e6f68", @ANYRES32=0x0, @ANYBLOB="04e3f9d8a362aeadc8e95df0ff00000000000000001c0012bf78826ea677ee69be5a000c79ba6764f5dbdf8254eb4bc3f954ad2af42d02ccc7fb3a76153e470c084774a6eb30941efe665a4667ce1a8b5bf465caeca30683bf8d947dce7bbc510916581b061f71028575"], 0x3c}}, 0x0) write$eventfd(r4, &(0x7f0000000400)=0x9, 0x8) 09:53:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc008ae88, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:03 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:16 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:16 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000080)={{0x5, 0x7}, 'port0\x00', 0x1, 0x2, 0xfc9, 0x0, 0x4, 0x5, 0x8a, 0x0, 0x2, 0x3}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 09:53:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0184900, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="7400000024000b05000052a0c633000200000000", @ANYRES32, @ANYBLOB="00000500f1ffffffffffffff080001007366710048e40d6ce104deccbbbde735b9a00000000000000000000000002033cc3598c9aa8178bdf1000000000000000000000000de7f46870000000000000020afc2ff8bdd90f7e146d8e46a0000000000009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c41f3771603fd386dc70a77e574632bd950e808d63007d6c6683e251ac28f6b621f863af067671514a292528d7d2bef3b8404b64c875270810633f2eb7d7a89d0f3cfa80232bea2a074143cd720026dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e28ba5302e15a86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd00000000000037d24b14dc40dfd5a5ace4d30743be825d71e10b0a7bd353828cbda2bc0d150d9a5d31e782dacb29a813e6fa45280ed6783296be4c033cd2b618c5240726fd8b82286b554ad61c7f61288eb912e11174858edea8a78880944f7bb0d837a674223c41feb7c22913c32a1e351950ca29743f84f453d948b6f145340c4afab9614236b8b7db5a7804533c494ab21dd74a552c7b6036558b4cf347fa4f96e7ce1f0f04c99b69df9acb274f84b714d44bc376ed1a67009528b833a39c049b767cf57d68a9fa4d20f1997362e6cbc5c734e58de6693f0ffb6aee69a483b5060b35d310fdb894ccee97ebcf0eaba6dc43d500"/554], 0x74}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@local, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000a00)) chown(&(0x7f0000000580)='./file0\x00', r1, r2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) socketpair(0x5, 0x80000, 0x3, &(0x7f0000000a40)={0xffffffffffffffff}) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000a80)={@broadcast, @empty}, &(0x7f0000000ac0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x26c, 0x10, 0x100, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x1, 0x40020}, [@IFLA_VFINFO_LIST={0x24c, 0x16, [{0x108, 0x1, [@IFLA_VF_VLAN_LIST={0x90, 0xc, [{0x14, 0x1, {0xffffffff, 0x943, 0x8, 0x8100}}, {0x14, 0x1, {0x3, 0x90a, 0xd6e}}, {0x14, 0x1, {0x1f, 0x952, 0x4a, 0x8100}}, {0x14, 0x1, {0x9, 0x444, 0x5, 0xd6578e59617d943a}}, {0x14, 0x1, {0x1, 0xead, 0x7, 0x88a8}}, {0x14, 0x1, {0xffffffffffff7fff, 0xd8, 0x800, 0x8100}}, {0x14, 0x1, {0x0, 0x4cd, 0x9, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xfffffffffffffff7, 0x7}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0xfffffffffffff801}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x0, 0x40}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xe52b, 0x6}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x100000000, 0xae1}}, @IFLA_VF_MAC={0x28, 0x1, {0x80000001, @link_local}}]}, {0x38, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x4, 0x9}}, @IFLA_VF_RATE={0x10, 0x6, {0xf740, 0x8001, 0x2}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x2, 0x2592}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xd59, 0x5}}]}, {0x1c, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x81, 0x81}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x1000, 0x1000}}]}, {0x20, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x9bd, 0x352, 0x6}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xad87, 0x7}}]}, {0x6c, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x4}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x36178576, 0xd91}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffffffffffff9b7, 0x8}}, @IFLA_VF_RATE={0x10, 0x6, {0x1, 0x5, 0xcd1}}, @IFLA_VF_TRUST={0xc, 0x9, {0x9, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x3, 0x8}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3ff, 0x10000}}]}, {0x60, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3ff, 0x200}}, @IFLA_VF_VLAN={0x10, 0x2, {0x6, 0xcc4, 0x62e}}, @IFLA_VF_MAC={0x28, 0x1, {0x1, @link_local}}, @IFLA_VF_VLAN={0x10, 0x2, {0x2, 0xd67, 0x2fe}}]}]}]}, 0x26c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/79, 0x4f}], 0x1}, 0x2022) 09:53:16 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:16 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0185879, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 960.403433][T13832] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. [ 960.438798][T13832] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. 09:53:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:16 executing program 4: r0 = socket$inet(0xa, 0x803, 0x8) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000040)=0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x290000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x5) 09:53:16 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x200, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0585604, &(0x7f0000000100)={0x0, 0x1}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r1, &(0x7f0000000000)="d10c333c6ebb6873e03557e57a7f7b092526d1ad2b07604bb3c570da23b5a2216d4df1bc8065", 0x26, 0x800, 0x0, 0x0) 09:53:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc018aa3f, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:16 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xd, &(0x7f00000001c0)=0x0) r2 = dup(r0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000140)=0x40800) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x10001) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000040)={0x1d, r4}, 0x10) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000000)=""/49) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0400000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f00000000000000000001000000", 0x38}]) 09:53:32 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) getsockname$netlink(r0, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000100)={0x7, @vbi}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x4e22, 0x1, @rand_addr="8ed41005dcf3f54ff350911815cd3cac", 0x7ff}, {0xa, 0x4e22, 0x8000, @mcast2, 0x100}, 0x0, [0x400, 0x2, 0x200, 0x9, 0x3c80000000000000, 0x7, 0x100000000]}, 0x5c) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000300)=0xfffffffffffffdc1) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0x9, @vbi={0x80000001, 0x0, 0x80000000, 0x0, [0x9, 0x5], [0x3, 0x5], 0x1}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x80000001, 0x0, 0x3, 0x7, 0xe8, 0x826d}) 09:53:32 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0205647, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) truncate(&(0x7f0000000000)='./file0\x00', 0x87f8) listen(r0, 0x5) socketpair(0x11, 0x5, 0x81, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000080)="68507208e065db888a5d9368a83f2fbf9dc7eed6eba855b27e764a951b6b9384ee08b314627cd00b6a46a212fc5fe362b88de49b18629ec81be11950117f7eda4aa7ecfe84b0e5cfa45d6c27a4ecbe9d30285a4934a0b3a09c0b705b366f52b2a6d21b9b6bd4ff5c50c3e3888d1a88d0cc159b5a2ccdfdacad3b16ad469749afebb0ef12e9f6a8d4580487dbaaeec4cf09", 0x91, 0x4cc2db16aa954189, &(0x7f0000000140)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x1800000000000000, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) tee(r3, r1, 0x567b, 0x1) 09:53:32 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x5093, 0x10000) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f00000002c0)='%\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7ff, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000000c0)={0x9, r2}) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x9, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000200)) r4 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000000000)={0x1, 0x300}) 09:53:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc020aa00, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:32 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4000010) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, r1) 09:53:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc058565d, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000001e00)='/dev/admmidi#\x00', 0x4, 0x4000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001e80)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000002000)={&(0x7f0000001e40)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000001fc0)={&(0x7f0000001ec0)={0xcc, r5, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4771}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa8}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/577]}, 0x2b9) 09:53:41 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0c0583b, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:41 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_DISCONNECT(r1, 0xab08) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) 09:53:41 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) migrate_pages(0x0, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x3, &(0x7f00000001c0)=0xb7b, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@host}) r1 = eventfd(0x0) dup3(r1, r0, 0x0) 09:53:41 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:53:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc1105517, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 986.302250][T13938] block nbd2: NBD_DISCONNECT [ 986.310833][T13937] block nbd2: Disconnected due to user request. [ 986.317921][T13937] block nbd2: shutting down sockets [ 986.341872][T13938] block nbd2: NBD_DISCONNECT 09:53:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'b%idge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 986.354515][T13949] block nbd2: Device being setup by another task [ 986.361024][T13937] block nbd2: Disconnected due to user request. [ 986.368410][T13937] block nbd2: shutting down sockets 09:53:42 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000140)=""/249, 0xf9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff46, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) accept$inet(r1, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x101c7, 0x6, 0x0, 0x800e00520) shutdown(r1, 0x0) 09:53:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'b\\idge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:48 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {r0}], 0x2, 0x400080000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x4}, 0x0) shutdown(r1, 0x0) 09:53:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'br%dge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:48 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:48 executing program 4: mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/20, 0x14}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}], 0x1}, 0x0) shutdown(r1, 0x0) 09:53:48 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:53:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'br\\dge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:48 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {}, {r0}, {}, {}, {r0}], 0x6, 0x400080000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x4}, 0x0) shutdown(r1, 0x0) 09:53:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridg%0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridg\\0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:48 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:57 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:53:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge%\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:57 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff46, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) socketpair(0x2, 0x0, 0x80000000, 0x0) recvfrom$inet(r1, 0x0, 0x101c7, 0x6, 0x0, 0x800e00520) shutdown(r1, 0x0) 09:53:57 executing program 4: poll(&(0x7f0000000140)=[{}, {}, {}], 0x3, 0x400080000004c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x6}, 0x0) shutdown(r0, 0x0) 09:53:57 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:53:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:57 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:53:57 executing program 2: 09:53:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:53:57 executing program 2: 09:53:57 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:06 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:06 executing program 2: 09:54:06 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:06 executing program 4: 09:54:06 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:54:06 executing program 2: 09:54:06 executing program 4: 09:54:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:06 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) get_robust_list(0x0, &(0x7f00000002c0)=0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) 09:54:06 executing program 2: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x44080) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f900"/76, 0x4c}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2ee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)) iopl(0x100000) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000002c0)) prctl$PR_SET_TSC(0x1a, 0x3) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0], 0x1}) gettid() r3 = shmget$private(0x0, 0x1000, 0x80, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000003c0)=""/207) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x5, 0x0, 0x7, 0x36d, 0x0, 0x0, 0x2d510c8ea6a42b6f, 0x2, 0x98, 0x8001, 0x7, 0x0, 0x3, 0x0, 0x0, 0x7, 0x2fcf, 0x5, 0x8001, 0x5fb, 0x2, 0x10001, 0x3, 0x3f, 0x0, 0x10001, 0x0, 0x1, 0x0, 0x200, 0xbd45, 0x1, 0x3, 0x4, 0x1000, 0x7ff, 0x0, 0x3, 0x7, @perf_bp={&(0x7f0000000140), 0x7}, 0x24010, 0x84, 0x7, 0x6, 0x3f, 0x0, 0x480000}, 0x0, 0xf, r2, 0x1) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) clock_gettime(0x0, &(0x7f0000005200)) [ 1011.364195][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.390598][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.474070][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.483812][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.502340][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.511992][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.522282][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.531767][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.541253][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1011.550943][T14133] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 09:54:13 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:13 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:13 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2024, &(0x7f0000000180)={[{@i_version='i_version'}]}) 09:54:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 1018.248298][T14151] EXT4-fs (sda1): re-mounted. Opts: i_version, [ 1018.430679][T14166] EXT4-fs (sda1): re-mounted. Opts: i_version, 09:54:19 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:54:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 09:54:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:19 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl(r0, 0xffff, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x4100) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x2, 0x0, 0x1}}, 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000000c0)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, 0x2c) 09:54:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 09:54:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{0x0}], 0x1, &(0x7f0000000780)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESHEX=r3, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYRES64=r0]], @ANYRES64=r1, @ANYRES32=r1, @ANYBLOB="6e2734dba2750e7ce963d4b9e0e79c634b2eb8345ddc5172ec0911e214253ff381eb8ad5e6581cc7482a359c4579d2938479f220d9dddf5b92c43258a69d922ae4082bcd105072c2f04d7b946b04d9e022c64fc87398ece1d08ecef7f1d8f4eba33670efaf1c3d16d9be06a531adce6a839e83b0125df2737c0b57372df301fce8f29c4727a521effee14dabce9a3dd28546302e1edc1a1d2676c57b2c45b0f8fc371eb99904200526656a7847ee2c25a09d407b04aa8c7acfaea7290e1fb71fe04adad4e78b4d2f7e31324670218468be86374933d12a5e3d96691288c4fd26eb1955a5a457c7f45bc5791f893d34f4ff2196c3306ac1b4e247358c27b2", @ANYPTR, @ANYRESDEC=r2, @ANYBLOB="b9293dfbf2f3cdc8893777642ea3992c56725e87ad280d159793925a5087d5bd5f01a715cc4c99eb23359e95d4e745d000fc719a8e57e395764e5a4052a14f4ff46d967d891b18271e465d0cd9c0aa2086852aaf89e627630914a63e5d758817cd4ec6e55605bcfe9741d869286f6bf40c1606b1cdd0f217adf1cf", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYRES64=0x0]]], 0x1b1, 0x12}, 0x0) recvmmsg(r1, &(0x7f0000006a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/57, 0x39}, {&(0x7f0000000280)=""/220, 0xdc}, {&(0x7f00000000c0)=""/17, 0x11}, {&(0x7f0000000380)=""/134, 0x86}, {&(0x7f00000004c0)=""/61, 0x3d}], 0x5}}, {{0x0, 0x0, &(0x7f0000002b40)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000002d00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000004240)=[{0x0}, {0x0}], 0x2, &(0x7f0000004300)=""/66, 0x42}}, {{&(0x7f0000005680)=@caif=@rfm, 0x80, &(0x7f0000005780)}}, {{0x0, 0x0, &(0x7f0000005b40), 0x0, &(0x7f0000005b80)=""/226, 0xe2}}, {{0x0, 0x0, &(0x7f0000006480), 0x0, &(0x7f0000006500)=""/200, 0xc8}}], 0x6, 0x10062, 0x0) 09:54:29 executing program 2: getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='autogroup\x00') preadv(r1, &(0x7f0000000000), 0x3a2, 0x0) 09:54:29 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) 09:54:29 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:29 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:54:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="3900000013000904688a0700000000000700ff3f04000000450001070000001419001a000600000004005d141d3529f6a40000000000000000", 0x39}], 0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x140, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000100)={[], 0xfffffffffffffff7, 0x100, 0x4, 0x0, 0x8, 0x11f005, 0x2000, [], 0x7}) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x12) 09:54:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:29 executing program 4: r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10) ioctl$void(r0, 0xc0045878) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40, 0x8000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080), 0x0) getuid() lookup_dcookie(0x0, 0x0, 0x0) mlock2(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) 09:54:29 executing program 2: capset(&(0x7f00000000c0)={0x400019980330}, &(0x7f0000000300)) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) 09:54:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:29 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:29 executing program 4: r0 = socket$inet(0x10, 0x400000003, 0xd) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000030607031dfffddeaa2b650020200a0009000b0003000800000000000000ff7e", 0x24}], 0x1}, 0x0) 09:54:36 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x287, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x9b7e, 0xffffffffffffff00, 0x7, 'queue1\x00', 0x6}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) mlock2(&(0x7f0000000000/0x4000)=nil, 0xe07036, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000203, 0x0) 09:54:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:36 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaa0f5f35c8d9ba02ef71"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) 09:54:38 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:38 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:38 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000300)=""/160) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000440)={'eql\x00', @ifru_data=&(0x7f0000000400)="3a1dca7233bcc82c0fcf9190ab79b1ef4445ee34b2d79497c75c1cb29779b8cd"}) io_setup(0xd, &(0x7f00000001c0)=0x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xc0, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x2, @remote, 0x3}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e20, 0x1f, @mcast2, 0x4}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x95}, @in6={0xa, 0x4e21, 0x6, @mcast2, 0x7}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000100)=0x10) r3 = dup3(r0, r0, 0x80000) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r2, 0xffff, 0x30}, 0xc) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000083f420f00000000000000000001000000", 0x38}]) syz_open_dev$video4linux(&(0x7f0000000600)='/dev/v4l-subdev#\x00', 0x9, 0x404) 09:54:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:38 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'em0wlan1nodevQem1/\x00'}) r0 = open(&(0x7f0000002940)='./file0\x00', 0x800, 0x0) getpeername$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x14) 09:54:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000010a00)=ANY=[@ANYBLOB="180000000000000000000000000000006b019800000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x393, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3c0, 0x10, &(0x7f0000000040)}, 0x48) 09:54:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:38 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:54:45 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="200025bd7000fedbdf250f0000040c000100080001000a0000eb08000400ff0000a3"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4004801) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="621f"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:45 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f00000000c0)=0x9, 0xfd4d) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, &(0x7f0000000280)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x240000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x100b, 0x1}) 09:54:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:45 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:54:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:45 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default trusted:em1 '], 0x1, 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='|'], 0x1, 0x0) clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000001c0)={0x0, {{0xa, 0x4e24, 0x1, @remote, 0x4}}, {{0xa, 0x4e24, 0xfffffffffffffffb, @loopback, 0x200}}}, 0x108) r1 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f00000008c0)='TIPCv2\x00', 0xfffffffffffffffc) syz_open_dev$sndmidi(&(0x7f0000000400)='/dev/snd/midiC#D#\x00', 0x7f, 0x400000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000880)={&(0x7f0000000440), 0xc, &(0x7f0000000840)={&(0x7f00000004c0)={0x350, r2, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1805254b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3241a5}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xad34948}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x25, @rand_addr="423ed0873f9ffc27632046adc6ad921f", 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x8000, @dev={0xfe, 0x80, [], 0xf}, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x8, @mcast1, 0x2}}}}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_BEARER={0x114, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'netdevsim0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}, {0x14, 0x2, @in={0x2, 0x4e20}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1200000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xba0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8ab4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffffe}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff5447}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x619b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffe0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x350}}, 0x800) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000300)="cad97ea1647ff55ce0df9ec7fd854dd32d7900c8140e22f5c25177a20928044e6b06d66f322062796d4cedc3f3456c6daf9aaec630fab305059d9325aa5600beb50e6dd9f25f1ba2b2718d99ddfcec9c7ffb57e6b4a9f9eabee64c2020e26def4b286d4225b2684e7c9700"/118, 0x13f, r1) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) write$apparmor_current(r3, &(0x7f0000000040)=@profile={'changeprofile ', '[-c.em0eth1vboxnet0{bdev\x00'}, 0x27) 09:54:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3, 0x0, 0x2}) ioctl$SIOCAX25ADDUID(r0, 0x890b, 0x0) 09:54:45 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x1, 0x4) getsockname(r0, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000001c0)) 09:54:45 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:54:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:46 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x88, 0x4, 0x6bc6}, 0xda0d}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x5, &(0x7f0000000180)) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x2d7) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0xbef}]}, 0xfffffffffffffed8) sendto$inet6(r4, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) 09:54:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000300)=0x7, 0x4) close(r0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0xc0, 0x0) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000200)=""/236) syncfs(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000040)=0x2) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) read$alg(r4, &(0x7f00000000c0)=""/37, 0x25) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8953, &(0x7f0000000080)=0x8000000000000) 09:54:54 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:54 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:54:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80000, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000140)=""/45) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="608cbd12393c47fbdd54437b69ea240a86867f3a705eb6998c80e8e33381d664c7f41c68a9a28808a0612a92aa87bebdb811d0e88da14f1347b0a74faa70bb2b80922da6d1a346041776d0ed78c912d1ef97a2b3f49750169675c55f5c07b21a64c5f56af6ab6ce3183c745d924edeaff0e866bd6fd0f9ecd1d8612d1b7fd79db748bdb26e1448a8f347f6693888a8edd3dcb93c0e56f971784d0ee6819ec0a2d80cb8d41f36bf222d3bb82df24bf22709f36c1d8cb300d5bab209a9c7ed6f5cdc25d94b7dcbb2cfd9ae3e1d000000009a3fd3288a2442bc688010"], 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x14800) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @remote}, 0x240, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)='syzkaller0\x00', 0x8000, 0x9, 0x2}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffdd, 0x0, 0x0, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:54:54 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0xfac8, 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b06, &(0x7f0000000180)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\x15\x06\x00\x00\x00\x02\x02\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9e\xe4h\x94\x8dE\xc8\xf3\xa9\xf7\xaf\xe9e\xd4\xd8a\xc3\xfd\xca\x16;\xb8A\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDPce\x95\x87\x14[s,\xde\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x13\r^\xd99\x14\x85\xb6') 09:54:54 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:54:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x40000000006, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) 09:54:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:55 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 1059.465339][T14401] kvm: emulating exchange as write 09:54:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:54:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1060.146030][T14395] debugfs: Directory '14395-5' with parent 'kvm' already present! 09:55:05 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000180)=0x17642c1) pread64(r0, 0x0, 0x0, 0x0) 09:55:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:05 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 09:55:05 executing program 4: mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/20, 0x14}, {0x0}, {0x0}], 0x3}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}], 0x1}, 0x0) shutdown(r1, 0x0) 09:55:05 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:05 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 09:55:05 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) fcntl$addseals(r0, 0x409, 0x0) 09:55:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:14 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:55:14 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 09:55:14 executing program 4: r0 = socket(0x1, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 09:55:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="3d0000006f00000400000000000000000000000000000000000000000000000000fb8a30fb000000000000000000000000000050dd2576a44c5bb791570fe065dfe92caf47e8f5d1f50daf87b09554f71725d3ef38bde0d2a6eea3db4e86c9d11ea6dddfc8a78fd60d"], 0x69) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=""/187}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x81, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f0000002100)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x262}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 09:55:14 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:14 executing program 4: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0xffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x80000000016, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000140)) 09:55:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:15 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 09:55:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:15 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 1079.982118][T14497] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1079.992680][T14497] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1080.002833][T14497] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1080.018890][T14497] EXT4-fs: failed to create workqueue [ 1080.025011][T14497] EXT4-fs (loop2): mount failed 09:55:23 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:55:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:23 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700), 0x0, 0x10000}], 0x0, 0x0) 09:55:23 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x40000000006, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 09:55:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) 09:55:23 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:23 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700), 0x0, 0x10000}], 0x0, 0x0) 09:55:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:55:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {}, {r0}, {}, {}], 0x5, 0x400080000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffe14, 0x0, 0x0, 0x800e00519) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x5}, 0x0) shutdown(r1, 0x0) 09:55:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:30 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:55:30 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0xffffffffffffff77) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 09:55:30 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700), 0x0, 0x10000}], 0x0, 0x0) 09:55:30 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0xfac8, 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b06, &(0x7f0000000180)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\x15\x06\x00\x00\x00\x02\x02\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9e\xe4h\x94\x8dE\xc8\xf3\xa9\xf7\xaf\xe9e\xd4\xd8a\xc3\xfd\xca\x16;\xb8A\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDPce\x95\x87\x14[s,\xde\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x13\r^\xd99\x14\x85\xb6') 09:55:30 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:30 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6tnl0\x00', r3}) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000001440)=@req={0xfffffffffffffffe}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@rand_addr="a6ac30405bd92f9bea3c5597afc948ee", 0x0, r4}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r6, @in6={{0xa, 0x4e20, 0x9, @mcast1, 0x6}}, 0xff, 0x2}, &(0x7f0000000280)=0x90) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000340)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) write$FUSE_ATTR(r0, &(0x7f00000002c0)={0x78, 0x0, 0x3, {0xffffffffffffffff, 0x6, 0x0, {0x3, 0x5, 0x0, 0xffffffff, 0x5, 0x0, 0x8, 0x9, 0x9, 0x2, 0x1000, 0x0, 0x0, 0x3f, 0x225dcb33}}}, 0x78) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r5, @ANYRES16=r2], 0x2) 09:55:30 executing program 4: r0 = socket(0xa, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000001400)={&(0x7f00000000c0)={0x2, 0x4e24, @rand_addr=0x5}, 0x10, &(0x7f0000001340)=[{&(0x7f0000000100)="a515a2f06394466bf42a0e7564221400154b84a488f4d207fe7a551adaa7f95004555980d6de883198c3b90c0e34c339a03d0e831b3aa0d22338a076a6848c6597c5a3f90880fe24b65656b2f83562f9d02e25e4f9446a17bb8882d6e5716411de39b9ac9e8d9fbec15162933beccde0b6947ecd96fcbcbdcb1c5455712b9139e7ded11e979238820d488847ad26c06267bf", 0x92}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="04838925f47a398fd95bae95feebf35711d23584492fcbaf98f8048f8c0b1376db568179fb91f65567f128bf18d237b7113fa59a97bcc371611122f4a7854024415d8cc67989c9abf7e4e38c13a69917b0cd936bf942951275981c54ec4c4548a9", 0x61}, {&(0x7f0000001240)="29b6298bba61e6", 0x7}, {&(0x7f0000001280)="f5c5ce9231791f8b03b6971143405e1a258aea3cd49ad9bba1491076957920e1403af1562334bdf2e6e72d461092a76df5fa6237e7c89897d75b5cef1022f85d07f0f73ad22176fda6f70b2bffd247c22c7681b17f8abc2c4886f7791c51c15148a52438b30bede04321685d45f82c4528ea9920a30e64c6a8a2c43cc1363cabf628c17b4e6a1682f0904cb4f19c5fcd8a7801099c7aed37271d9840a06afd452c86a7545124faac23c4bcf2d95e72911785", 0xb2}], 0x5, &(0x7f00000013c0)}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x02\x00M\xbf\x00\x00\x00\x00\b\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x2bc, &(0x7f0000000040)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="2c0000001500010800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe80000000b7a396d0e6ae0751003f00"], 0x2c}}, 0x0) 09:55:30 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 1094.692485][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.698405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1094.704266][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.711549][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:55:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x1f, 0x1, 0x1}) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) [ 1094.932500][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.938320][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:55:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x800, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x1, 0x400, 0x401, @time={0x0, 0x1c9c380}, {0x0, 0x8}, {0xfffffffffffffffa, 0xffffffffffff8001}, @result}], 0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, r1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x1, 0x1, 0xff, 0x0}, 0x20) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20000, 0x0) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0xfffffffffffffffd) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, 0x0, 0x0) getegid() 09:55:30 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 1094.999574][T14613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.234260][T14640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1095.254798][T14640] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.261912][T14640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.482619][T14617] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.542995][T14626] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.550100][T14626] bridge0: port 1(bridge_slave_0) entered forwarding state 09:55:37 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:37 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 09:55:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a9897bbb73ec91e506789b4cdddb4e76724ea719c96d893b6ddca0ea93fb30075e99df2f6f0a429a13e403ec6b666869c128db38a5668b145e6313f3ee41e2f28204b8de605afd31885d362411efa3cd8f400ba69bef4aa6dae8f00d8e0f53c6acb5ded04e5435e7a3bfaab8d914916e569bbcea7aa4f0972e376bb9f94c5268f7eec052fb08dfabe6158878d444d4bf66d9aeedfc3b42890163f5658cc4ffa9ed4d0a"], 0x10}}, 0x0) 09:55:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:47 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000a10c0000000000009f7e414ddce63787f049cd55dab6451158000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:55:47 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 09:55:47 executing program 2: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x6}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_timedreceive(r0, &(0x7f0000000080)=""/204, 0x3a, 0x0, 0x0) 09:55:47 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='pids.current\x00', 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000540), &(0x7f0000000580)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80005040}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="53001c4eb5e20d5236faa82e15b9ee60e8cf5491263572f8f11b30c3f67ac10c6dbea2c1c5340bdb8574b4d63503ad7c478da63bed7ef4d201d3a4ddb93d1aac63c360ab9d9cfe488e83e195f647fae9fcb95827d395f30abde68803d35f881c2a176ceb76cea759de1c674fe45d8a63585930a136ea8186f27ddfa36d941a1406eecb61e05ea88343ab6855c60f8834c550456794672090493944b3fa3f78df50fc393d4b07bb1ad64fea7a9d54120a198f0f42dbb01b0fb168727fdfab4deb128c4400"/234, @ANYRES16=r3, @ANYBLOB="20002bbd7000fedbdf250800000008000500ff0700003c00020008000b000a00000014000100ac14142000000000000000000000000014000100fe800000000000000000000000000019080007000700000024000100080004004e210000080002001d00000008000b0073697000080002003a000000"], 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0xc800) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$netlink(0x10, 0x3, 0x4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x124, r5, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2d}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc55}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000780)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000600)={0x13c, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf856}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000000, @local, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x81, @local, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xffffffff, @local, 0x100000000}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10000, @mcast2, 0xff}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x24040000) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000140)="580000001400192340834b80020d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100050c1000418e00000004fcff", 0x58}], 0x1) 09:55:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:48 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 09:55:48 executing program 2: migrate_pages(0x0, 0x4, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x2) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8003, 0x4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)="3605e562a95df3017d9961011c51f1a52c", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x3, &(0x7f00000001c0)=0xb7b, &(0x7f0000000200)=0x100000001) 09:55:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x2000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xc2072768de1ce384}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r2, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x14802) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x9, @loopback, 0x45c7f092}}, 0xffffffff80000001, 0x6}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e22, 0x4, @rand_addr="a81b12c4220ea7fb184fa17d13b343a0", 0x7}}}, 0x84) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r5, &(0x7f0000011ff0)={0x2, 0x4e20, @empty}, 0x10) listen(r5, 0x0) 09:55:59 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:59 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 09:55:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:59 executing program 4: timer_create(0x0, &(0x7f0000044000)={0x0, 0x800000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000100)) 09:55:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x400002, 0x6f126189d807cc70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x200, 0x20100) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x10128) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {0x0}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 09:55:59 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:55:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:59 executing program 4: socket$kcm(0x11, 0x6, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) fstatfs(r0, &(0x7f0000000080)=""/105) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0xea91f05536b33e3b, 0x0}, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) 09:55:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) write(r1, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) 09:55:59 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000", 0x3f, 0x10000}], 0x0, 0x0) 09:55:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:55:59 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x2, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080)=0x401, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000040)={0xffffffff, 0x1, 0x7, 0x1}) 09:56:08 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:08 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000", 0x3f, 0x10000}], 0x0, 0x0) 09:56:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000000c0)=0x3f) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000100)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001300)=[{&(0x7f0000000140)="16", 0x1}], 0x1, &(0x7f0000001340)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x41}}], 0x30}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)=0x1) 09:56:08 executing program 4: clone(0x1200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x9ed88d2d0eb1a19f, r0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) ptrace$poke(0x5, r0, &(0x7f0000000000), 0x0) 09:56:08 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2000000050000}]}) r0 = open(0x0, 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x0) 09:56:08 executing program 2: r0 = open(&(0x7f0000001840)='./file0\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x4521b3de5ecb2ec6) r1 = gettid() write$P9_RGETLOCK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) tkill(r1, 0x1000000000016) 09:56:08 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000", 0x3f, 0x10000}], 0x0, 0x0) 09:56:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:17 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:17 executing program 2: 09:56:17 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f424852", 0x44, 0x10000}], 0x0, 0x0) 09:56:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:17 executing program 4: 09:56:17 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:17 executing program 2: 09:56:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:17 executing program 4: 09:56:17 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f424852", 0x44, 0x10000}], 0x0, 0x0) 09:56:17 executing program 2: 09:56:17 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x60100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast1}}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 09:56:24 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 09:56:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:24 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f424852", 0x44, 0x10000}], 0x0, 0x0) 09:56:24 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) 09:56:24 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDDISABIO(r0, 0x4b37) 09:56:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:24 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 09:56:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2000000050000}]}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 09:56:25 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 09:56:33 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:33 executing program 2: write(0xffffffffffffffff, &(0x7f0000000380), 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x2000) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x100, 0x8, 0x2}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000080), 0x4) pipe(0x0) 09:56:33 executing program 4: r0 = socket(0x15, 0x805, 0x0) getsockopt(r0, 0x114, 0x2718, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x14) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080), 0x4) 09:56:33 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 09:56:33 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000001940)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:34 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x4, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}}}, 0x108) 09:56:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 09:56:34 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 09:56:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700000000000000950000000000000015e2195ec4e496788f986509bf520a76ea71c45e36c57ca2c26e627a9070d6d9b002fd8c8ee41b426c1cb3f440f44629f5acd0443f245a271e0a1123c3ab70a7d9886872898d80023d667648b976caa93d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x70) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x300, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x8000000000103}, 0x28) 09:56:51 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:51 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\x14Ym1\x04\x00\x00\xbe\x00\x00\x00\x00\x00\x00\x00\x00\xc4\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x41) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) io_setup(0x0, &(0x7f00000000c0)=0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x20140, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x6, 0x400) io_submit(r2, 0x2, &(0x7f0000000500)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000300), 0x0, 0x200, 0x0, 0x0, r3}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, r1, &(0x7f00000003c0)="4e4b14ee1763fd426b11b3cd86466125186a509d3f12f5d53e096fde7bdc42cb43194bf5b21af894d8e6442134d37b361ca60df49b52d6e24a305b091d56aa50b6a40c5080c0cbf8d975ec4c7b74572d5598b6810a7958d368f1a83db131faa57282ae50a0cc73627a5e752d586f073ae8ac9864498aa0605d5c046e0a1916bf104f49130508f7f87c4d4c243cbb0b2693712143910e924a5e4dcc74efcd4fdabe237657d1", 0xa5, 0xa323, 0x0, 0x0, r4}]) 09:56:51 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f900"/76, 0x4c}], 0x1}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000005080)=0xf3e, 0x4) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000050c0)=0x101, 0x4) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000004ec0)=[{{&(0x7f0000000100)=@caif=@rfm, 0x80, &(0x7f0000000540)=[{&(0x7f0000000180)=""/117, 0x160}, {&(0x7f00000002c0)=""/99, 0x63}, {&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/247, 0xf7}], 0x4, &(0x7f0000000580)=""/6, 0x6}, 0x800}, {{&(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000640)=""/202, 0xca}, {&(0x7f0000000740)=""/105, 0x69}, {&(0x7f00000007c0)=""/51, 0x33}], 0x3, &(0x7f0000000840)=""/54, 0x36}, 0x100}, {{&(0x7f0000000880)=@xdp, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000000900)=""/107, 0x6b}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/160, 0xa0}, {&(0x7f0000002a40)=""/99, 0x63}], 0x5, &(0x7f0000002b40)=""/212, 0xd4}, 0x40}, {{&(0x7f0000002c40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002cc0)=""/73, 0x49}, {&(0x7f0000002d40)=""/150, 0x96}, {&(0x7f0000002e00)=""/88, 0x58}, {&(0x7f0000002e80)=""/153, 0x99}, {&(0x7f0000002f40)=""/142, 0x8e}, {&(0x7f0000003000)=""/213, 0xd5}], 0x6, &(0x7f0000003180)=""/162, 0xa2}, 0x550}, {{&(0x7f0000003240), 0x80, &(0x7f0000003880)=[{&(0x7f00000032c0)=""/94, 0x5e}, {&(0x7f0000003340)=""/119, 0x77}, {&(0x7f00000033c0)=""/181, 0xb5}, {&(0x7f0000003480)=""/142, 0x8e}, {&(0x7f0000003540)=""/241, 0xf1}, {&(0x7f0000003640)=""/211, 0xd3}, {&(0x7f0000003740)=""/190, 0xbe}, {&(0x7f0000003800)=""/112, 0x70}], 0x8, &(0x7f0000003900)=""/123, 0x7b}, 0x8}, {{&(0x7f0000003980)=@generic, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a00)=""/21, 0x15}, {&(0x7f0000003a40)=""/141, 0x8d}, {&(0x7f0000003b00)=""/18, 0x12}, {&(0x7f0000003b40)=""/37, 0x25}, {&(0x7f0000003b80)=""/253, 0xfd}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000004c80)=""/79, 0x4f}, {&(0x7f0000004d00)=""/118, 0x76}], 0x8, &(0x7f0000004e00)=""/161, 0xa1}, 0x7}], 0x6, 0x3a, &(0x7f0000000200)={r2, r3+10000000}) clock_gettime(0x0, &(0x7f0000005200)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000005040)=0x1) 09:56:51 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 09:56:53 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000001940)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(adiantum(xts-aes-ce,camellia-generic),sha224-avx2)\x00'}, 0x1fc) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x100000000000000, 0x8f8b, 0xa30d}) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) close(r1) 09:56:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:53 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x40045108, &(0x7f0000001340)=""/4096) userfaultfd(0x80000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x5, 0x6}) 09:56:53 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 09:56:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:56:53 executing program 2: r0 = socket(0x2, 0x803, 0x0) write(r0, &(0x7f0000000000)="1f00000013000d0000000000fc07011b0704043903000000070001c07bb626", 0x1f) 09:56:58 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48}], 0x0, 0x0) 09:56:58 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:56:58 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80080, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000001c0)=[{{0x0, 0x7530}, 0x12, 0x3, 0x3}, {{r1, r2/1000+10000}, 0x3, 0x4, 0x200000000000}], 0x30) r3 = socket(0x15, 0x805, 0x0) r4 = socket(0x15, 0x80005, 0x0) getsockopt(r4, 0x114, 0x2716, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x2dd) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000100)={0x32, 0x1, 0xc, 0x8, 0x9}) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000000)={'bond_slave_0\x00', 0x80000000}) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x30000, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000080)={[{0x81, 0x1, 0x1f, 0x4, 0x0, 0x5, 0x1f, 0x3, 0xf47, 0x7fffffff, 0x2, 0x1, 0x2}, {0x1ff, 0x8, 0x2, 0x4, 0x0, 0x7, 0x6, 0x1, 0x7fff, 0x59c, 0x80000000, 0x7, 0x1}, {0x7, 0x0, 0x4, 0x10001, 0x1f, 0x0, 0x7, 0x4, 0x39, 0xe0af, 0x3f, 0x9, 0x8}], 0x8}) 09:56:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) recvmmsg(r0, &(0x7f0000002340)=[{{&(0x7f00000001c0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/181, 0xb5}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/174, 0xae}, {&(0x7f0000000480)=""/135, 0x87}, {&(0x7f0000000540)=""/80, 0x50}], 0x6, &(0x7f0000000640)=""/203, 0xcb}, 0x8}, {{&(0x7f0000000740)=@ax25={{0x3, @bcast}, [@rose, @netrom, @bcast, @remote, @rose, @netrom, @netrom, @netrom]}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/104, 0x68}, {&(0x7f0000000840)=""/5, 0x5}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000980)=""/255, 0xff}, {&(0x7f0000000a80)=""/36, 0x24}, {&(0x7f0000000ac0)=""/103, 0x67}], 0x6, &(0x7f0000000bc0)=""/206, 0xce}, 0x3798}, {{&(0x7f0000000cc0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002200)=[{&(0x7f0000000d40)=""/82, 0x52}, {&(0x7f0000000dc0)=""/209, 0xd1}, {&(0x7f0000000ec0)=""/167, 0xa7}, {&(0x7f0000000f80)=""/114, 0x72}, {&(0x7f0000001000)=""/6, 0x6}, {&(0x7f0000001040)=""/129, 0x81}, {&(0x7f0000001100)=""/121, 0x79}, {&(0x7f0000001180)=""/26, 0x1a}, {&(0x7f00000011c0)=""/45, 0x2d}, {&(0x7f0000001200)=""/4096, 0x1000}], 0xa, &(0x7f00000022c0)=""/98, 0x62}, 0x10000}], 0x3, 0x10000, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000002400)={@remote, 0xa, r1}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xca) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x1, 0x0, &(0x7f0000000180)) 09:56:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:06 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000001940)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:06 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r1 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x72429d4a75bc2546, r0}, {0x2, 0x5, r1}, {0x2, 0x1, r2}], {0x4, 0x737aa8015178600e}, [{0x8, 0x1, r3}, {0x8, 0x4, r4}], {0x10, 0x4}, {0x20, 0x4}}, 0x4c, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="726568697a653d617574ef2c6a71666d743d76c3737630"]) 09:57:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x22040) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x4, 0x0) 09:57:06 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48}], 0x0, 0x0) 09:57:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1190.449314][T15044] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "rehize=autï" [ 1190.503377][T15040] XFS (loop2): Invalid superblock magic number 09:57:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:06 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 1190.605991][T15064] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "rehize=autï" 09:57:07 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, 0x0, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:07 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000040)={0x80, 0x1, &(0x7f00000000c0)="d85d67b37ef2791fbd11c5733f918c0b4552686ea1c6d0fc8f6e7cb4b530130b878af3fbe6772aee2d97aeeef59d48de803a6c4cfd202dbc5751c7a3365f4c3e3a9e2edeccff90c340a507f940c104321da918ede5b44a442c064d40b2bc980637bd4691a4c49088bb503443020c46c65185b877205c71ba3e9eb37ce0541f121308d39758", {0x3f, 0x9, 0x71564f57, 0x0, 0x7, 0x0, 0x8, 0x40}}) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000180)={0x1, 0x2, 0x4}) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000000)) 09:57:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x88004, 0x0) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000d40)='.\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x117, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r1, 0x2}}, 0x18) 09:57:17 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:17 executing program 0 (fault-call:4 fault-nth:0): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:57:17 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) setitimer(0x1, &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xba, &(0x7f00000001c0)=""/186, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), 0x1}, 0x70) 09:57:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x14}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x2) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000001240)={0x2e, @empty, 0x4e20, 0x4, 'nq\x00', 0x3, 0xe, 0x40}, 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000008008) pipe2$9p(&(0x7f00000000c0), 0x4000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) prctl$PR_GET_SECCOMP(0x15) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100032, 0x0) bind$bt_sco(r0, &(0x7f0000001200)={0x1f, {0xfff, 0x1, 0x2, 0x97, 0x8000, 0x7}}, 0x8) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000080)={0x0, 0x1, @value}) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000100)={0x2, 0x0, [{0x0, 0x4, 0x0, 0x0, @msi={0x7fff, 0x8000, 0x54}}, {0x7092000, 0x1, 0x0, 0x0, @msi={0x8, 0x0, 0x20}}]}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 09:57:17 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, 0x0, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1201.739161][T15103] FAULT_INJECTION: forcing a failure. [ 1201.739161][T15103] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.759208][T15103] CPU: 1 PID: 15103 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1201.768337][T15103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.778400][T15103] Call Trace: [ 1201.781710][T15103] dump_stack+0x172/0x1f0 [ 1201.786066][T15103] should_fail.cold+0xa/0x15 [ 1201.790669][T15103] ? fault_create_debugfs_attr+0x180/0x180 [ 1201.796083][T15107] IPVS: set_ctl: invalid protocol: 46 0.0.0.0:20000 [ 1201.796483][T15103] ? ___might_sleep+0x163/0x280 [ 1201.796508][T15103] __should_failslab+0x121/0x190 [ 1201.812860][T15103] should_failslab+0x9/0x14 [ 1201.817362][T15103] __kmalloc+0x2e0/0x770 [ 1201.817382][T15103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1201.817400][T15103] ? fput_many+0x12c/0x1a0 [ 1201.827852][T15103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1201.827870][T15103] ? strnlen_user+0x1ed/0x2e0 [ 1201.827891][T15103] ? __x64_sys_memfd_create+0x13c/0x470 [ 1201.848707][T15103] __x64_sys_memfd_create+0x13c/0x470 [ 1201.854077][T15103] ? memfd_fcntl+0x18c0/0x18c0 [ 1201.858827][T15103] ? do_syscall_64+0x26/0x760 [ 1201.863496][T15103] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1201.868766][T15103] ? trace_hardirqs_on+0x67/0x240 [ 1201.873783][T15103] do_syscall_64+0xfa/0x760 [ 1201.878290][T15103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.884166][T15103] RIP: 0033:0x459879 [ 1201.888046][T15103] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1201.907628][T15103] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1201.916018][T15103] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1201.923971][T15103] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1201.931924][T15103] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 09:57:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1201.939876][T15103] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb5ecd416d4 [ 1201.947829][T15103] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:57:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x2100, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x2dc8a98a, 0x8000) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000003c0)={0x0, r3}) r4 = openat$audio(0xffffffffffffff9c, 0x0, 0x151100, 0x0) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f0000000200)={0x0, 0x2, @stop_pts=0xff}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x800) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x1003080, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000400)={0x100000000, 0xd52, 0xffffffff}) quotactl(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x100000}) set_thread_area(&(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x400, 0x0, 0x3f, 0x6, 0x100000000, 0x2, 0x0, 0xcbfb}) ioctl$KVM_RUN(r2, 0xae80, 0x0) shmctl$IPC_INFO(0x0, 0xf, &(0x7f0000000000)=""/100) 09:57:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:17 executing program 0 (fault-call:4 fault-nth:1): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:57:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1202.318386][T15129] FAULT_INJECTION: forcing a failure. [ 1202.318386][T15129] name failslab, interval 1, probability 0, space 0, times 0 09:57:18 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='teql0\x00') ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0445611, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000014de608a0d3a54ac00dfffffff07cd13955d6325e845eded9530698493839e5cb9bb55ce0bfc2ffe0d00000000fe"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x0, 0x0, 0x0, 0x0, [0x42], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 1202.392080][T15129] CPU: 1 PID: 15129 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1202.401229][T15129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.411286][T15129] Call Trace: [ 1202.414591][T15129] dump_stack+0x172/0x1f0 [ 1202.418971][T15129] should_fail.cold+0xa/0x15 [ 1202.423581][T15129] ? fault_create_debugfs_attr+0x180/0x180 [ 1202.429406][T15129] ? ___might_sleep+0x163/0x280 [ 1202.434274][T15129] __should_failslab+0x121/0x190 [ 1202.439221][T15129] ? shmem_destroy_inode+0x80/0x80 [ 1202.444341][T15129] should_failslab+0x9/0x14 [ 1202.448850][T15129] kmem_cache_alloc+0x2aa/0x710 [ 1202.453703][T15129] ? __alloc_fd+0x487/0x620 [ 1202.458217][T15129] ? shmem_destroy_inode+0x80/0x80 [ 1202.463336][T15129] shmem_alloc_inode+0x1c/0x50 [ 1202.468112][T15129] alloc_inode+0x68/0x1e0 [ 1202.472446][T15129] new_inode_pseudo+0x19/0xf0 [ 1202.477128][T15129] new_inode+0x1f/0x40 [ 1202.481202][T15129] shmem_get_inode+0x84/0x7e0 [ 1202.485895][T15129] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1202.491450][T15129] shmem_file_setup+0x66/0x90 [ 1202.496141][T15129] __x64_sys_memfd_create+0x2a2/0x470 [ 1202.501518][T15129] ? memfd_fcntl+0x18c0/0x18c0 [ 1202.501539][T15129] ? do_syscall_64+0x26/0x760 [ 1202.501560][T15129] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1202.510980][T15129] ? trace_hardirqs_on+0x67/0x240 [ 1202.521253][T15129] do_syscall_64+0xfa/0x760 [ 1202.525773][T15129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.531674][T15129] RIP: 0033:0x459879 [ 1202.535565][T15129] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1202.556001][T15129] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1202.564395][T15129] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1202.572371][T15129] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1202.580325][T15129] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1202.588278][T15129] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb5ecd416d4 [ 1202.596236][T15129] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1202.636675][T15107] EXT4-fs (sda1): re-mounted. Opts: [ 1202.682431][T15138] EXT4-fs (sda1): re-mounted. Opts: 09:57:25 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:25 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0) fallocate(r0, 0x0, 0x2000421, 0x9) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 09:57:25 executing program 0 (fault-call:4 fault-nth:2): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:57:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10001, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, 0x0, 0x0) 09:57:25 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, 0x0, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1210.129644][T15156] FAULT_INJECTION: forcing a failure. [ 1210.129644][T15156] name failslab, interval 1, probability 0, space 0, times 0 09:57:25 executing program 2: [ 1210.173154][T15156] CPU: 0 PID: 15156 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1210.182310][T15156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.192380][T15156] Call Trace: [ 1210.195691][T15156] dump_stack+0x172/0x1f0 [ 1210.200059][T15156] should_fail.cold+0xa/0x15 [ 1210.204680][T15156] ? fault_create_debugfs_attr+0x180/0x180 [ 1210.210519][T15156] ? ___might_sleep+0x163/0x280 [ 1210.215408][T15156] __should_failslab+0x121/0x190 [ 1210.220370][T15156] should_failslab+0x9/0x14 [ 1210.224886][T15156] kmem_cache_alloc+0x2aa/0x710 [ 1210.229755][T15156] ? current_time+0x6b/0x140 [ 1210.234351][T15156] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1210.234374][T15156] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1210.234396][T15156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1210.251677][T15156] ? timespec64_trunc+0xf0/0x180 [ 1210.256634][T15156] __d_alloc+0x2e/0x8c0 [ 1210.260821][T15156] d_alloc_pseudo+0x1e/0x70 [ 1210.265347][T15156] alloc_file_pseudo+0xe2/0x280 09:57:25 executing program 2: 09:57:26 executing program 2: [ 1210.270223][T15156] ? alloc_file+0x4d0/0x4d0 [ 1210.274756][T15156] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1210.281029][T15156] __shmem_file_setup.part.0+0x108/0x2b0 [ 1210.286681][T15156] shmem_file_setup+0x66/0x90 [ 1210.291381][T15156] __x64_sys_memfd_create+0x2a2/0x470 [ 1210.296777][T15156] ? memfd_fcntl+0x18c0/0x18c0 [ 1210.301562][T15156] ? do_syscall_64+0x26/0x760 [ 1210.306259][T15156] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1210.311566][T15156] ? trace_hardirqs_on+0x67/0x240 [ 1210.316727][T15156] do_syscall_64+0xfa/0x760 09:57:26 executing program 2: [ 1210.321260][T15156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1210.327162][T15156] RIP: 0033:0x459879 [ 1210.331073][T15156] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1210.350692][T15156] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1210.359118][T15156] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 09:57:26 executing program 2: 09:57:26 executing program 4: [ 1210.367100][T15156] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1210.375088][T15156] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1210.383072][T15156] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb5ecd416d4 [ 1210.391056][T15156] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:57:32 executing program 2: 09:57:32 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:32 executing program 4: 09:57:32 executing program 0 (fault-call:4 fault-nth:3): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:57:32 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:32 executing program 2: 09:57:32 executing program 4: 09:57:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1217.256988][T15184] FAULT_INJECTION: forcing a failure. [ 1217.256988][T15184] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.291863][T15184] CPU: 0 PID: 15184 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 09:57:33 executing program 2: [ 1217.301005][T15184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.311062][T15184] Call Trace: [ 1217.314345][T15184] dump_stack+0x172/0x1f0 [ 1217.318781][T15184] should_fail.cold+0xa/0x15 [ 1217.323362][T15184] ? fault_create_debugfs_attr+0x180/0x180 [ 1217.329228][T15184] ? ___might_sleep+0x163/0x280 [ 1217.334095][T15184] __should_failslab+0x121/0x190 [ 1217.339029][T15184] should_failslab+0x9/0x14 [ 1217.343523][T15184] kmem_cache_alloc+0x2aa/0x710 [ 1217.348367][T15184] ? rwlock_bug.part.0+0x90/0x90 09:57:33 executing program 4: [ 1217.353319][T15184] ? lock_downgrade+0x920/0x920 [ 1217.358160][T15184] __alloc_file+0x27/0x340 [ 1217.358178][T15184] alloc_empty_file+0x72/0x170 [ 1217.367364][T15184] alloc_file+0x5e/0x4d0 [ 1217.371658][T15184] alloc_file_pseudo+0x189/0x280 [ 1217.376594][T15184] ? alloc_file+0x4d0/0x4d0 [ 1217.376613][T15184] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1217.376645][T15184] __shmem_file_setup.part.0+0x108/0x2b0 [ 1217.393083][T15184] shmem_file_setup+0x66/0x90 [ 1217.393104][T15184] __x64_sys_memfd_create+0x2a2/0x470 [ 1217.393116][T15184] ? memfd_fcntl+0x18c0/0x18c0 [ 1217.393131][T15184] ? do_syscall_64+0x26/0x760 [ 1217.393146][T15184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1217.393159][T15184] ? trace_hardirqs_on+0x67/0x240 [ 1217.393174][T15184] do_syscall_64+0xfa/0x760 [ 1217.393193][T15184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1217.393209][T15184] RIP: 0033:0x459879 [ 1217.403264][T15184] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1217.403273][T15184] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1217.403285][T15184] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1217.403291][T15184] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1217.403299][T15184] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1217.403305][T15184] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb5ecd416d4 [ 1217.403311][T15184] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:57:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x0, 0x54d6e595, 0x800}) write$UHID_INPUT(r1, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000001100)) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000001540)=0x6) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000001140)={"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"}) 09:57:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:44 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:44 executing program 0 (fault-call:4 fault-nth:4): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:57:44 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = msgget(0x3, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xffffffffffffffbb) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) r7 = gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000780)={{0xffff, r3, r4, r5, r6, 0x2, 0x401}, 0x4, 0xff, 0x7, 0xfffffffffffffff9, 0x7ff, 0x2, r7, r8}) r9 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000400)="585ccbc4ed83b836c1a6474914dc5500b602c02bc7218a91690000000042e3d35228897507000000000000006ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfac1700b986f40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d00000000000040000000000000000000000000000000794c", 0xc2, r1) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44e", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r10, r9, r10}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) 09:57:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1f, &(0x7f0000000040)='\x00\x00\x00') fchdir(r0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = accept$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @null}, [@netrom, @default, @remote, @rose, @null, @netrom, @default, @netrom]}, &(0x7f0000000000)=0x48) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000000c0)={0x6, 0x4e, 0x4}) eventfd2(0x4ebe, 0x800) sendto$llc(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x200000000304, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000240)={r3, r4/1000+10000}, 0xffffffffffffff67) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c500)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x5, 0x0, 0x0, 0x7d48bddc}, 0x100000001}, {{0x0, 0x0, &(0x7f000000c700)=[{&(0x7f000000c680)=""/90, 0x5a}], 0x1, &(0x7f000000c740)=""/16, 0x10, 0x7f}, 0x200}, {{&(0x7f000000c780)=@ethernet, 0x80, &(0x7f000000ca00)=[{&(0x7f000000c800)=""/210, 0xd2}, {&(0x7f000000c900)=""/92, 0x5c}, {&(0x7f000000c980)=""/82, 0x52}], 0x3, &(0x7f000000ca40)=""/40, 0xfffffdbd}, 0x6}, {{&(0x7f000000ca80)=@pppol2tpv3in6, 0x80, &(0x7f000000cd00)=[{&(0x7f000000cb00)=""/255, 0xff}, {&(0x7f000000cc00)}, {&(0x7f000000cc40)=""/180, 0xb4}], 0x3, &(0x7f000000cd40)=""/5, 0x5, 0x2}, 0xffffffff}], 0x5, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x200) 09:57:44 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1228.540865][T15216] FAULT_INJECTION: forcing a failure. [ 1228.540865][T15216] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.561593][T15216] CPU: 1 PID: 15216 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1228.571292][T15216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.581324][T15216] Call Trace: [ 1228.584598][T15216] dump_stack+0x172/0x1f0 09:57:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1228.588913][T15216] should_fail.cold+0xa/0x15 [ 1228.593483][T15216] ? fault_create_debugfs_attr+0x180/0x180 [ 1228.599276][T15216] ? ___might_sleep+0x163/0x280 [ 1228.604109][T15216] __should_failslab+0x121/0x190 [ 1228.609027][T15216] should_failslab+0x9/0x14 [ 1228.613508][T15216] kmem_cache_alloc+0x2aa/0x710 [ 1228.618362][T15216] ? kmem_cache_alloc+0x364/0x710 [ 1228.623400][T15216] security_file_alloc+0x39/0x170 [ 1228.628430][T15216] __alloc_file+0xde/0x340 [ 1228.632847][T15216] alloc_empty_file+0x72/0x170 [ 1228.637647][T15216] alloc_file+0x5e/0x4d0 [ 1228.641897][T15216] alloc_file_pseudo+0x189/0x280 [ 1228.646842][T15216] ? alloc_file+0x4d0/0x4d0 [ 1228.651358][T15216] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1228.657612][T15216] __shmem_file_setup.part.0+0x108/0x2b0 [ 1228.663256][T15216] shmem_file_setup+0x66/0x90 [ 1228.667937][T15216] __x64_sys_memfd_create+0x2a2/0x470 [ 1228.673306][T15216] ? memfd_fcntl+0x18c0/0x18c0 [ 1228.678067][T15216] ? do_syscall_64+0x26/0x760 [ 1228.682745][T15216] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1228.688028][T15216] ? trace_hardirqs_on+0x67/0x240 [ 1228.693057][T15216] do_syscall_64+0xfa/0x760 [ 1228.697567][T15216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1228.703456][T15216] RIP: 0033:0x459879 [ 1228.707346][T15216] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1228.726948][T15216] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1228.735355][T15216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1228.743318][T15216] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1228.751280][T15216] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1228.759248][T15216] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb5ecd416d4 [ 1228.767212][T15216] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:57:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:44 executing program 0 (fault-call:4 fault-nth:5): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1229.046524][T15231] FAULT_INJECTION: forcing a failure. [ 1229.046524][T15231] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.082133][T15231] CPU: 1 PID: 15231 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1229.091265][T15231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.101323][T15231] Call Trace: [ 1229.104620][T15231] dump_stack+0x172/0x1f0 [ 1229.108961][T15231] should_fail.cold+0xa/0x15 [ 1229.113566][T15231] ? fault_create_debugfs_attr+0x180/0x180 [ 1229.119391][T15231] ? ___might_sleep+0x163/0x280 [ 1229.124251][T15231] __should_failslab+0x121/0x190 [ 1229.129196][T15231] should_failslab+0x9/0x14 [ 1229.133702][T15231] __kmalloc+0x2e0/0x770 [ 1229.137944][T15231] ? mark_held_locks+0xf0/0xf0 09:57:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1229.142711][T15231] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1229.148600][T15231] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1229.154403][T15231] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1229.160125][T15231] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1229.165688][T15231] ? tomoyo_path_perm+0x1cb/0x430 [ 1229.170721][T15231] tomoyo_path_perm+0x230/0x430 [ 1229.175550][T15231] ? tomoyo_path_perm+0x1cb/0x430 [ 1229.180584][T15231] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1229.186655][T15231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1229.192913][T15231] ? rcu_read_lock_any_held+0xcd/0xf0 [ 1229.198376][T15231] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1229.203648][T15231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1229.209901][T15231] tomoyo_path_truncate+0x1d/0x30 [ 1229.214918][T15231] security_path_truncate+0xf2/0x150 [ 1229.220185][T15231] do_sys_ftruncate+0x3d9/0x550 [ 1229.225017][T15231] __x64_sys_ftruncate+0x59/0x80 [ 1229.229950][T15231] do_syscall_64+0xfa/0x760 [ 1229.234461][T15231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1229.240428][T15231] RIP: 0033:0x459847 [ 1229.244411][T15231] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1229.264087][T15231] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1229.272489][T15231] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 1229.280450][T15231] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000005 [ 1229.288505][T15231] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1229.296459][T15231] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 1229.304424][T15231] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1229.320954][T15231] ERROR: Out of memory at tomoyo_realpath_from_path. 09:57:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) syncfs(r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737465642e2f6465762f6b766d0037792f276257694c0146d94648b015266017edd92331fdc985e7f6f37c30d7ebd2fb830fa54b16a72ce0540dc800e8d961c3ea564e07eeeb37f3179c23538531ade048f26b162922a3b1107702454db6cbff20929d5766"]) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000500)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff) [ 1229.536909][T15243] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns 09:57:58 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:57:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:57:58 executing program 0 (fault-call:4 fault-nth:6): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:57:58 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0x3}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x290002) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) 09:57:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000180)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x5) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) mount$9p_rdma(&(0x7f0000000480)='127.0.0.1\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x10, &(0x7f0000000580)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@rq={'rq'}}, {@rq={'rq'}}, {@rq={'rq', 0x3d, 0x15}}, {@common=@version_9p2000='version=9p2000'}, {@common=@dfltgid={'dfltgid'}}, {@common=@cachetag={'cachetag', 0x3d, '/dev/ubi_ctrl\x00'}}, {@rq={'rq'}}], [{@pcr={'pcr', 0x3d, 0x3e}}, {@subj_type={'subj_type', 0x3d, 'keyring)'}}]}}) sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x8000, 0x0, 0x0) 09:57:58 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1243.172882][T15264] FAULT_INJECTION: forcing a failure. [ 1243.172882][T15264] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.201786][T15264] CPU: 0 PID: 15264 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1243.211067][T15264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.221145][T15264] Call Trace: [ 1243.224469][T15264] dump_stack+0x172/0x1f0 [ 1243.228841][T15264] should_fail.cold+0xa/0x15 [ 1243.233471][T15264] ? fault_create_debugfs_attr+0x180/0x180 [ 1243.239316][T15264] ? ___might_sleep+0x163/0x280 [ 1243.244211][T15264] __should_failslab+0x121/0x190 [ 1243.249179][T15264] should_failslab+0x9/0x14 [ 1243.253892][T15264] __kmalloc+0x2e0/0x770 [ 1243.258243][T15264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1243.264490][T15264] ? simple_dname+0xd1/0x1f0 [ 1243.264532][T15264] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1243.264556][T15264] tomoyo_encode2.part.0+0xf5/0x400 [ 1243.264576][T15264] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1243.264602][T15264] tomoyo_encode+0x2b/0x50 [ 1243.264623][T15264] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1243.295738][T15264] ? tomoyo_path_perm+0x1cb/0x430 [ 1243.300814][T15264] tomoyo_path_perm+0x230/0x430 [ 1243.305675][T15264] ? tomoyo_path_perm+0x1cb/0x430 [ 1243.310754][T15264] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1243.316875][T15264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 09:57:59 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x2000, &(0x7f0000000000/0x2000)=nil}) 09:57:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1243.323184][T15264] ? rcu_read_lock_any_held+0xcd/0xf0 [ 1243.328589][T15264] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1243.334016][T15264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1243.340430][T15264] tomoyo_path_truncate+0x1d/0x30 [ 1243.345646][T15264] security_path_truncate+0xf2/0x150 [ 1243.351051][T15264] do_sys_ftruncate+0x3d9/0x550 [ 1243.355948][T15264] __x64_sys_ftruncate+0x59/0x80 [ 1243.360915][T15264] do_syscall_64+0xfa/0x760 [ 1243.365464][T15264] entry_SYSCALL_64_after_hwframe+0x49/0xbe 09:57:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1243.371495][T15264] RIP: 0033:0x459847 [ 1243.375411][T15264] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1243.395123][T15264] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1243.403562][T15264] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 1243.411663][T15264] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000005 09:57:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x81, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000780)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="54e73c5dbc7196493647d377566aef0e3268", 0xffffffdf}]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) [ 1243.419656][T15264] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1243.427826][T15264] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 1243.435974][T15264] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:57:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000080)=0xa4ffffff, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) 09:57:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1243.515541][T15264] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1244.473375][T12009] device bridge_slave_1 left promiscuous mode [ 1244.480083][T12009] bridge0: port 2(bridge_slave_1) entered disabled state [ 1244.553203][T12009] device bridge_slave_0 left promiscuous mode [ 1244.559361][T12009] bridge0: port 1(bridge_slave_0) entered disabled state [ 1244.712886][T12009] device hsr_slave_0 left promiscuous mode [ 1244.763041][T12009] device hsr_slave_1 left promiscuous mode [ 1244.830001][T12009] team0 (unregistering): Port device team_slave_1 removed [ 1244.842294][T12009] team0 (unregistering): Port device team_slave_0 removed [ 1244.853714][T12009] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1244.891220][T12009] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1244.978500][T12009] bond0 (unregistering): Released all slaves 09:58:05 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:05 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000340)="1eae9b6bed39810ff1e497445b6ec3548aa24280d8bc554f6902ac5a092bd61e49f22364416b70688bfe2f50679e784a47dcff892b694446bb018841a5794e0ddf0cda64901683e60d7de791ed1c09f4b0bcadfa50592235c2def5cf91a930c592", 0x61}], 0x1}, 0x48000) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000980)='/proc/capi/capi20\x00', 0x1030c0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000009c0)) syz_open_dev$radio(&(0x7f0000000940)='/dev/radio#\x00', 0x1, 0x2) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xff0f}], 0x3, 0x0) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x7fff, 0x9, &(0x7f00000007c0)=[{&(0x7f00000001c0)="f28c9a9be317935a8aeea1a3c32329eae6ce337a2f8538cf4096fb981fe47d51c5cc487b918bfc578422e06994f19293c98c468762d0a0212fbca353278b938ac020455080630361e3307c22f9ed0cd601261535940050218c03107775838b2cd366855b81b0f0e13b1fc58bd5194a29f595ee92414aac0cc3e6d30a839945da3fb05b7209449449bccf64bcfe2cd376a763af35c7e3bae5c2ded6351c27f7cd061f22eea5467f1ed31f", 0xaa, 0x133}, {&(0x7f0000000140)="3e86a110d3ee83e83ec547f48f9a94e2f8dca0a6f09b24ec11c0f2fead88b6c7e6bd6df3ac16ada09cf9f9670629e2eae72d73022ca8bd75763dd5", 0x3b, 0x1}, {&(0x7f0000000280)="621e8514c22f604580a5b656540c1aa167eba363d5f221d0d4ef36a7582bf112ce0d5a9fe674a2ae2f20a2db53961b17e7aac3bacffe76ebe9bf16", 0x3b, 0x7}, {&(0x7f00000003c0)="1e550d96041eb3102295e6217334091dc547658dc932852c3199718e444063b6538ef1d0a9b88934e4d37a8fd05efb029a12321af2d086ccdc2bbe6822d7b94619aa51e2aad25172333c0677747ffd17baa6629952cb8851abf09e5c79be3257a0778dd83435dfd3603073e16d5930aa8dd58d426d4f0cd5346e18d9eaf082ffc4b4c6b0bcceacb030fb0c0a2b00a9c58152838ee41bac636c85ea06c567fdf66a9dc6b9e5776a1067bcb89d39f81c8d56460bfe82b6da871c99886033c5c4f498addc683cf128a09d7be251bdedbbff57d53a4979e0de1ff7f2b99b60d89645f89e4796a90a0d0a311634d33189", 0xee, 0x9}, {&(0x7f00000004c0)="ffc22898c21054e4566963c4351183d019082bbf27efe21404d4a8ae45e3a9fb9fb377482b6e4fdb792d23aa3bb5e3e1cbdd78b9cb3554a5d79aeea4f431b5f4d3a26f02174da914092e3c9896ab52ff6f224c9825a650f41e2e3e68f913e6d43c661afe79c4694815a02cd35efa8a25e5564871f1411ec07c1f16871c9a87c6410ce1fa766508e1bd7abcae9d4c03c6f87be03cb9c99a8ada", 0x99, 0x58093589}, {&(0x7f00000002c0)="1e8e4e55d70d6cab545c072729f5ec13c8f7f44a59b1b9c6cf5ac4e5b9ee127417f28081f4ddde6c2d7c28267983e1a63e882da7b2e49814899cb1ab95faeec6cab620d75f", 0x45, 0x1}, {&(0x7f0000000580)="c0d46db98bd5b178007e86e11d8a59", 0xf, 0x2}, {&(0x7f00000005c0)="1b909e7c461fc01c3d9b9266c9517bacf8815758960c81ab87c0a66f900246add01d772259bd717444ee7c4469cd9d3888f04264d086802dd6b3b6bb131f11f6266774e5f48d8b69d36323f3454b55ad68c1fbb4f1f76794223de82e38664392b7da260c4d9476901804874d88afe59b389d5232667439ebc3bcab1187e2e27f855e243272a479ed443f4f75f0b474053667ddc015cfe1b83ed34dc4580bfb22eb714421ec68716cea6e1c792bde4c9603ce53efc8130eeeaed3af7aa1ddb12571b27db0523154a88ef9c48c4f42e8f85fd9b29f6ab3fa70e978334fb84f", 0xde, 0x7ff}, {&(0x7f00000006c0)="3a588057462aead3d5e22180247fe17268a294bb2441f2a4919a1975f7e924a7d670d0c1ad70774b861813ac2cd38c2bbf9ff476198262d9dce0be464cf043e8eae778e9470c0be4986bbdd976792ff7bbee25cc9b3c5c8639986086875d6ecd16d6e0c1c0ec2a53e428b0017df7712e2c02d2264b8c075ba992be2b5e782709ea643b4513ed605526a7bbaecebb92781f8cb7b7fe96b31d3477b1ca75dda1291dcc8f9a23ca531837255df912d767d62fe117e1bf7707011e1940951a58ab7b33b7adf5995d7eb24b1709a0838ae67b574126d53677a5a2b5de19", 0xdb, 0x2}], 0x8801, &(0x7f00000008c0)={[{@flush_merge='flush_merge'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cpusetvmnet0procwlan0md5sumsecurity'}}, {@seclabel='seclabel'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 09:58:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:05 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x66040) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 09:58:05 executing program 0 (fault-call:4 fault-nth:7): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:58:05 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1250.312366][T15299] FAULT_INJECTION: forcing a failure. [ 1250.312366][T15299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1250.341325][T15297] BFS-fs: bfs_fill_super(): Inode 0x00000002 corrupted on loop2 [ 1250.362557][T15299] CPU: 1 PID: 15299 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1250.371697][T15299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.381750][T15299] Call Trace: [ 1250.385053][T15299] dump_stack+0x172/0x1f0 [ 1250.389398][T15299] should_fail.cold+0xa/0x15 [ 1250.393998][T15299] ? fault_create_debugfs_attr+0x180/0x180 [ 1250.399807][T15299] ? ___might_sleep+0x163/0x280 [ 1250.404668][T15299] should_fail_alloc_page+0x50/0x60 [ 1250.409866][T15299] __alloc_pages_nodemask+0x1a1/0x900 [ 1250.415244][T15299] ? debug_smp_processor_id+0x3c/0x214 [ 1250.420707][T15299] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1250.426419][T15299] ? __kasan_check_read+0x11/0x20 [ 1250.431452][T15299] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1250.437693][T15299] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1250.443942][T15299] alloc_pages_vma+0x1bc/0x3f0 [ 1250.448715][T15299] shmem_alloc_page+0xbd/0x180 [ 1250.453486][T15299] ? shmem_swapin+0x1a0/0x1a0 [ 1250.458162][T15299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1250.464396][T15299] ? xas_start+0x166/0x560 [ 1250.468831][T15299] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1250.474550][T15299] ? __vm_enough_memory+0x1b7/0x390 [ 1250.479760][T15299] shmem_alloc_and_acct_page+0x165/0x990 [ 1250.485400][T15299] shmem_getpage_gfp+0x598/0x2680 [ 1250.490440][T15299] ? shmem_unuse_inode+0x1010/0x1010 [ 1250.495739][T15299] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1250.501547][T15299] ? current_time+0x6b/0x140 [ 1250.506140][T15299] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1250.511948][T15299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1250.518190][T15299] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1250.524262][T15299] shmem_write_begin+0x105/0x1e0 [ 1250.529207][T15299] generic_perform_write+0x23b/0x540 [ 1250.534497][T15299] ? timespec64_trunc+0x180/0x180 [ 1250.540272][T15299] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 1250.548334][T15299] ? current_time+0x140/0x140 [ 1250.553020][T15299] ? __kasan_check_write+0x14/0x20 [ 1250.558133][T15299] ? down_write+0xdf/0x150 [ 1250.562558][T15299] __generic_file_write_iter+0x25e/0x630 [ 1250.568185][T15299] ? __kasan_check_read+0x11/0x20 [ 1250.573212][T15299] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1250.578939][T15299] generic_file_write_iter+0x420/0x690 [ 1250.584403][T15299] ? __generic_file_write_iter+0x630/0x630 [ 1250.590208][T15299] ? __kasan_check_read+0x11/0x20 [ 1250.595233][T15299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1250.601474][T15299] ? iov_iter_init+0xee/0x220 [ 1250.606149][T15299] new_sync_write+0x4d3/0x770 [ 1250.610829][T15299] ? new_sync_read+0x800/0x800 [ 1250.615621][T15299] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1250.621783][T15299] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1250.627071][T15299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1250.633315][T15299] __vfs_write+0xe1/0x110 [ 1250.637644][T15299] vfs_write+0x268/0x5d0 [ 1250.641885][T15299] ksys_pwrite64+0x183/0x1c0 [ 1250.646474][T15299] ? __ia32_sys_pread64+0xf0/0xf0 [ 1250.651499][T15299] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1250.656969][T15299] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1250.662431][T15299] ? do_syscall_64+0x26/0x760 [ 1250.667110][T15299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.673185][T15299] ? do_syscall_64+0x26/0x760 [ 1250.677866][T15299] __x64_sys_pwrite64+0x97/0xf0 [ 1250.682713][T15299] do_syscall_64+0xfa/0x760 [ 1250.687218][T15299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.693107][T15299] RIP: 0033:0x4137c7 [ 1250.697002][T15299] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1250.716713][T15299] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1250.725125][T15299] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 1250.733096][T15299] RDX: 0000000000000048 RSI: 0000000020000700 RDI: 0000000000000005 [ 1250.741069][T15299] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1250.749042][T15299] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 09:58:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1250.757188][T15299] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1250.832509][T15302] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1250.840511][T15302] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 09:58:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:06 executing program 0 (fault-call:4 fault-nth:8): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1250.922614][T15302] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1250.938456][T15302] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 1251.066226][T15297] BFS-fs: bfs_fill_super(): Inode 0x00000002 corrupted on loop2 09:58:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1251.117137][T15318] FAULT_INJECTION: forcing a failure. [ 1251.117137][T15318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1251.160370][T15318] CPU: 0 PID: 15318 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1251.169531][T15318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.179596][T15318] Call Trace: [ 1251.182912][T15318] dump_stack+0x172/0x1f0 [ 1251.187279][T15318] should_fail.cold+0xa/0x15 [ 1251.191888][T15318] ? fault_create_debugfs_attr+0x180/0x180 [ 1251.197704][T15318] ? ___might_sleep+0x163/0x280 [ 1251.202587][T15318] should_fail_alloc_page+0x50/0x60 [ 1251.207794][T15318] __alloc_pages_nodemask+0x1a1/0x900 [ 1251.213183][T15318] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1251.218909][T15318] ? __kasan_check_read+0x11/0x20 [ 1251.223964][T15318] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1251.230209][T15318] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1251.236467][T15318] alloc_pages_vma+0x1bc/0x3f0 [ 1251.241251][T15318] shmem_alloc_page+0xbd/0x180 [ 1251.246030][T15318] ? shmem_swapin+0x1a0/0x1a0 [ 1251.250727][T15318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1251.256976][T15318] ? xas_start+0x166/0x560 [ 1251.261448][T15318] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1251.267169][T15318] ? __vm_enough_memory+0x1b7/0x390 [ 1251.272385][T15318] shmem_alloc_and_acct_page+0x165/0x990 [ 1251.278014][T15318] shmem_getpage_gfp+0x598/0x2680 [ 1251.283038][T15318] ? shmem_unuse_inode+0x1010/0x1010 [ 1251.288328][T15318] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1251.294139][T15318] ? current_time+0x6b/0x140 [ 1251.298732][T15318] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1251.304538][T15318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1251.310897][T15318] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1251.316783][T15318] shmem_write_begin+0x105/0x1e0 [ 1251.321713][T15318] generic_perform_write+0x23b/0x540 [ 1251.326984][T15318] ? timespec64_trunc+0x180/0x180 [ 1251.332007][T15318] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 1251.340054][T15318] ? current_time+0x140/0x140 [ 1251.344725][T15318] ? __kasan_check_write+0x14/0x20 [ 1251.349820][T15318] ? down_write+0xdf/0x150 [ 1251.354225][T15318] __generic_file_write_iter+0x25e/0x630 [ 1251.359839][T15318] ? __kasan_check_read+0x11/0x20 [ 1251.364864][T15318] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1251.370575][T15318] generic_file_write_iter+0x420/0x690 [ 1251.376026][T15318] ? __generic_file_write_iter+0x630/0x630 [ 1251.381833][T15318] ? __kasan_check_read+0x11/0x20 [ 1251.386866][T15318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1251.393102][T15318] ? iov_iter_init+0xee/0x220 [ 1251.397790][T15318] new_sync_write+0x4d3/0x770 [ 1251.402460][T15318] ? new_sync_read+0x800/0x800 [ 1251.407219][T15318] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1251.413381][T15318] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1251.418665][T15318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.424892][T15318] __vfs_write+0xe1/0x110 [ 1251.429208][T15318] vfs_write+0x268/0x5d0 [ 1251.433441][T15318] ksys_pwrite64+0x183/0x1c0 [ 1251.438033][T15318] ? __ia32_sys_pread64+0xf0/0xf0 [ 1251.443051][T15318] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1251.448522][T15318] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1251.453970][T15318] ? do_syscall_64+0x26/0x760 [ 1251.458656][T15318] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.464706][T15318] ? do_syscall_64+0x26/0x760 [ 1251.469579][T15318] __x64_sys_pwrite64+0x97/0xf0 [ 1251.481757][T15318] do_syscall_64+0xfa/0x760 [ 1251.486543][T15318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.492419][T15318] RIP: 0033:0x4137c7 [ 1251.496301][T15318] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1251.515886][T15318] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1251.524293][T15318] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 1251.532273][T15318] RDX: 0000000000000048 RSI: 0000000020000700 RDI: 0000000000000005 [ 1251.540228][T15318] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1251.548182][T15318] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 09:58:07 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0xb3) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000)=0x5, 0x4) fallocate(r0, 0x20, 0x0, 0x80000009) [ 1251.556136][T15318] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:58:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1252.327901][T15338] IPVS: ftp: loaded support on port[0] = 21 [ 1252.444036][T15338] chnl_net:caif_netlink_parms(): no params data found [ 1252.475859][T15338] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.483990][T15338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1252.491640][T15338] device bridge_slave_0 entered promiscuous mode [ 1252.499537][T15338] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.506725][T15338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1252.514737][T15338] device bridge_slave_1 entered promiscuous mode [ 1252.536663][T15338] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1252.547368][T15338] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1252.567430][T15338] team0: Port device team_slave_0 added [ 1252.574516][T15338] team0: Port device team_slave_1 added [ 1252.635357][T15338] device hsr_slave_0 entered promiscuous mode [ 1252.682685][T15338] device hsr_slave_1 entered promiscuous mode [ 1252.742562][T15338] debugfs: Directory 'hsr0' with parent '/' already present! [ 1252.761208][T15338] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.768292][T15338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1252.775670][T15338] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.782730][T15338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1252.826066][T15338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1252.838595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1252.847690][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 1252.856240][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 1252.864998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1252.881907][T15338] 8021q: adding VLAN 0 to HW filter on device team0 [ 1252.894276][T14227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1252.903251][T14227] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.910303][T14227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1252.924826][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1252.933983][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.941031][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1252.957068][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1252.966263][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1252.980787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1252.993046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1253.005232][T15338] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1253.017140][T15338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1253.026052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1253.048161][T15338] 8021q: adding VLAN 0 to HW filter on device batadv0 09:58:16 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:16 executing program 0 (fault-call:4 fault-nth:9): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:58:16 executing program 4: accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x240020}, 0xc, &(0x7f00000002c0)={0x0}}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8000, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000340)) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001e2, 0x0) write$smack_current(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00', 0x9) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x9}}, 0x18) 09:58:16 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x22, 0x0) perf_event_open(&(0x7f0000000f40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_proto_private(r0, 0x89e8, &(0x7f0000000200)="709fdc2effa1106a253d16ed170076945cc8745de65c40db53304bd5f4fc11d155bea5b1dbce11a42f0a1f4538b25b0f1abe45f55afccadf58b7dd693f2ec03dd083a64c1f879504cae66edc5043a076e620d9a3d7d8df7cf07ea9f600dec2ec4c40462b84e92e5b4a59a41c6012610d6481b70d170a80c9a5b9ab5b3e9270f2cb186830a77fd95d25ae454b2b3bb4381aedc39ec2e1aca527f1ef3a49") mq_unlink(&(0x7f00000011c0)='^\x00') bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80), 0x40002d1, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000440)={0xc00ba09f97693636, @sdr={0x0, 0x9}}) syz_mount_image$jfs(&(0x7f0000000400)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xf72, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='nointegrity,nointegrity,quota,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c7375626a5f7573657221707070302d5c6db198643573756d2c278e6cc8f1624cd808b4542aea17c16afad290ab0baad500000d25431ede088c2c06bd0d08fc21cc34"]) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001080)={0x0, 0x3ff, 0x7, 0x0, 0x200, 0x0, 0x1c8b, 0x4, {0x0, @in={{0x2, 0x4e20, @local}}, 0x4, 0x0, 0x0, 0x6dd, 0x5}}, &(0x7f0000000540)=0xb0) lookup_dcookie(0x6, &(0x7f00000005c0)=""/212, 0xd4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001140)={r1, 0x1000000000000da}, &(0x7f0000001040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r2}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="4c00000200000000000000b290e27fd124b39f573868272f81e97c43f40900"/40], &(0x7f00000003c0)=0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) [ 1260.845137][T15361] FAULT_INJECTION: forcing a failure. [ 1260.845137][T15361] name failslab, interval 1, probability 0, space 0, times 0 [ 1260.858407][T15361] CPU: 0 PID: 15361 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1260.867533][T15361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.877607][T15361] Call Trace: [ 1260.880939][T15361] dump_stack+0x172/0x1f0 [ 1260.885315][T15361] should_fail.cold+0xa/0x15 [ 1260.889929][T15361] ? __lockdep_free_key_range+0x120/0x120 [ 1260.890073][T15361] ? fault_create_debugfs_attr+0x180/0x180 [ 1260.901710][T15361] ? percpu_ref_put_many+0x94/0x190 [ 1260.906935][T15361] ? find_held_lock+0x35/0x130 [ 1260.911746][T15361] __should_failslab+0x121/0x190 [ 1260.916727][T15361] should_failslab+0x9/0x14 [ 1260.921355][T15361] kmem_cache_alloc+0x47/0x710 [ 1260.926142][T15361] ? __kasan_check_read+0x11/0x20 [ 1260.929670][T15363] jfs: Unrecognized mount option "subj_user!ppp0-\m±˜d5sum" or missing value [ 1260.931184][T15361] ? __lock_acquire+0x16f2/0x4a00 [ 1260.931208][T15361] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1260.931240][T15361] xas_alloc+0x346/0x460 [ 1260.931268][T15361] xas_create+0x2cd/0x1060 [ 1260.931307][T15361] xas_create_range+0x198/0x5d0 [ 1260.945232][T15361] shmem_add_to_page_cache+0x906/0x14d0 [ 1260.955250][T15361] ? shmem_writepage+0xef0/0xef0 [ 1260.955302][T15361] shmem_getpage_gfp+0xead/0x2680 [ 1260.980075][T15361] ? shmem_unuse_inode+0x1010/0x1010 [ 1260.985385][T15361] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1260.991208][T15361] ? current_time+0x6b/0x140 [ 1260.995815][T15361] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1261.001641][T15361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1261.007902][T15361] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1261.013832][T15361] shmem_write_begin+0x105/0x1e0 [ 1261.018800][T15361] generic_perform_write+0x23b/0x540 [ 1261.024103][T15361] ? timespec64_trunc+0x180/0x180 [ 1261.029174][T15361] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 1261.037256][T15361] ? current_time+0x140/0x140 [ 1261.041952][T15361] ? __kasan_check_write+0x14/0x20 [ 1261.047077][T15361] ? down_write+0xdf/0x150 [ 1261.051527][T15361] __generic_file_write_iter+0x25e/0x630 [ 1261.057173][T15361] ? __kasan_check_read+0x11/0x20 [ 1261.062212][T15361] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1261.067957][T15361] generic_file_write_iter+0x420/0x690 [ 1261.073449][T15361] ? __generic_file_write_iter+0x630/0x630 [ 1261.079257][T15361] ? __kasan_check_read+0x11/0x20 [ 1261.084277][T15361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1261.090518][T15361] ? iov_iter_init+0xee/0x220 [ 1261.095204][T15361] new_sync_write+0x4d3/0x770 [ 1261.099884][T15361] ? new_sync_read+0x800/0x800 [ 1261.104651][T15361] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1261.110813][T15361] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1261.116104][T15361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1261.122356][T15361] __vfs_write+0xe1/0x110 [ 1261.126692][T15361] vfs_write+0x268/0x5d0 [ 1261.130928][T15361] ksys_pwrite64+0x183/0x1c0 [ 1261.135522][T15361] ? __ia32_sys_pread64+0xf0/0xf0 [ 1261.140547][T15361] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1261.146007][T15361] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1261.151478][T15361] ? do_syscall_64+0x26/0x760 [ 1261.156158][T15361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1261.162234][T15361] ? do_syscall_64+0x26/0x760 [ 1261.166911][T15361] __x64_sys_pwrite64+0x97/0xf0 [ 1261.171764][T15361] do_syscall_64+0xfa/0x760 [ 1261.176294][T15361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1261.182197][T15361] RIP: 0033:0x4137c7 [ 1261.186092][T15361] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1261.205762][T15361] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1261.214172][T15361] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 1261.222158][T15361] RDX: 0000000000000048 RSI: 0000000020000700 RDI: 0000000000000005 [ 1261.230127][T15361] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1261.238096][T15361] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 1261.246082][T15361] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1261.345833][T15367] jfs: Unrecognized mount option "subj_user!ppp0-\m±˜d5sum" or missing value 09:58:19 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x40040, 0x0) accept$unix(r0, &(0x7f0000000500), &(0x7f0000000580)=0x6e) getsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000005c0)=""/4096) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x200000, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca54ed43be79a4dc35751e4f2ff284b2f328e1aab4c9c63efae4cddecf12027e9dc896d0bd07a505748fd16cf4685cd8746843d92100e1537cff4768afff1ee5c80efba503d29eee53ee86cac868350649a9f67e43d13bb2907123857f1e889f8e935d7e1f3b515c6a486bd0fc03040464e9dfc57d862eb6c3234934c68e2282082f6b6a27d377239c0b4b8bc9aecb18469e5ec419b0762ef77021014edb9babbaa0c7604a0f07bb275154daf55f2cbce353e51429a23b4e4d62600") bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) 09:58:19 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x8) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000001c0)={[{0x4, 0x100000000, 0x7, 0x9, 0xfffffffffffffff7, 0x4, 0x0, 0x3, 0x7, 0xbce3, 0x3, 0x9, 0x7f}, {0x310, 0x2, 0x5, 0x10000, 0x0, 0x0, 0x100, 0x1, 0x8, 0x6, 0x5, 0x10000}, {0x7d, 0x10000, 0x8, 0x7, 0x9, 0xffffffffffffcb07, 0x6, 0x80000000, 0x3, 0x81, 0x20, 0xfffffffffffffffa, 0x9c}], 0x7fffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=Zd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',access=client,loose,debug=f']) 09:58:19 executing program 0 (fault-call:4 fault-nth:10): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1263.737728][T15393] FAULT_INJECTION: forcing a failure. [ 1263.737728][T15393] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.750698][T15393] CPU: 1 PID: 15393 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1263.759811][T15393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.769866][T15393] Call Trace: [ 1263.773168][T15393] dump_stack+0x172/0x1f0 [ 1263.777504][T15393] should_fail.cold+0xa/0x15 [ 1263.782111][T15393] ? fault_create_debugfs_attr+0x180/0x180 [ 1263.787905][T15393] ? ___might_sleep+0x163/0x280 [ 1263.792763][T15393] __should_failslab+0x121/0x190 [ 1263.797698][T15393] should_failslab+0x9/0x14 [ 1263.802195][T15393] kmem_cache_alloc+0x2aa/0x710 [ 1263.807032][T15393] ? rcu_read_lock_any_held+0xcd/0xf0 [ 1263.812391][T15393] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1263.817659][T15393] getname_flags+0xd6/0x5b0 [ 1263.822148][T15393] getname+0x1a/0x20 [ 1263.826028][T15393] do_sys_open+0x2c9/0x5d0 [ 1263.830433][T15393] ? filp_open+0x80/0x80 [ 1263.834662][T15393] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1263.840109][T15393] ? do_syscall_64+0x26/0x760 [ 1263.844799][T15393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1263.850846][T15393] ? do_syscall_64+0x26/0x760 [ 1263.855508][T15393] __x64_sys_open+0x7e/0xc0 [ 1263.860028][T15393] do_syscall_64+0xfa/0x760 [ 1263.864529][T15393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1263.870401][T15393] RIP: 0033:0x413761 [ 1263.874295][T15393] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1263.893878][T15393] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1263.902268][T15393] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1263.910225][T15393] RDX: 00007fb5ecd40b0a RSI: 0000000000000002 RDI: 00007fb5ecd40b00 [ 1263.918176][T15393] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1263.926128][T15393] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 09:58:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1263.934170][T15393] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1263.957895][T15394] 9pnet: Could not find request transport: Zd 09:58:19 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x8, @mcast1, 0x200}, 0x1c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x8001, 0x80000) sendmsg$TIPC_NL_LINK_GET(r0, 0x0, 0x40000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000380)=@generic={0x0, 0x98d, 0xff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000000f650000000000006507000002000000070700004c00fbff1e75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000050000000000000095000000000000008a0b5286771a356045bf"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0xfffffd46}, 0x48) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'bond_slave_1\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev={0xfe, 0x80, [], 0x1a}, @in6=@rand_addr="114b5cfb96a22d56efbbd9a52314d254", 0x4e20, 0x1, 0x4e21, 0x5, 0x729e5455386db451, 0x20, 0x20, 0xca5f092215decdf2, r3, r4}, {0x4, 0x200000000000, 0x9, 0x3, 0x8000000000, 0x7, 0x6, 0x427}, {0x3, 0xd5, 0x101, 0x36}, 0x4, 0x6e6bbb, 0x1, 0x1, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0x6c}, 0xa, @in=@multicast2, 0x3506, 0x3, 0x0, 0xfff, 0x80, 0x1}}, 0xe8) exit(0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000680)={0x16, 0x98, 0xfa00, {&(0x7f0000000640)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x7, 0x6, {"354c029e16790661a2cc2efa03b81b99"}, 0x7, 0x10001, 0x1000}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000740)={0x11, 0x10, 0xfa00, {&(0x7f0000000600), r5}}, 0x18) r6 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0xa780) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="4c0000000a4735933f07aab671a3b8a187441dea61aa9c234c4f32a5d14417bc587cb874433324888ab2c4fbf81375e4f65557d217c7f51da5db3bf8e9245781f93960f63eae89940bab55e1eee135f3682edfcb9426271401cf48e91e6962258fe73c088e225f813a9c9f5312c4636727247c612b7b0c4b7c37c4a3631af3e85a1f2d", @ANYRES16=0x0, @ANYBLOB="4ddf9ed0739d8c2c0129bd7000fedbdf251200000020000600080001000500000004000200040002000400020008000100000000001800070008000100080000000c000400007474dd8e6439b760e4bde08e4bc31b4b6127101dd8cfea1e70d0e774af083dee569ba4186c017bd2361d0868fb1b2f413a49282e33d9ced269b4f936771742f2597add45adb0ebba3f6de81237240337680087572c1bbc7b691c9c951671fa658577ce126846d2324c3bb5eb023b6dc4cb155e276c5d141ce47b3008ae7fb2e7ad82b162b217c26bfbeafd7da5e274ba0dc12144e87e778be74e352d94cb53ee00faeb066c8024ffa1fa3089ca9184726c9361"], 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 09:58:27 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:27 executing program 0 (fault-call:4 fault-nth:11): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:58:27 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3ff, 0x101001) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)) 09:58:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000040)='\xf9\xef\x81\x00\x00\x00\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8202, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x1, {0x0, 0x10}}, 0x20) [ 1272.139351][T15417] FAULT_INJECTION: forcing a failure. [ 1272.139351][T15417] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1272.152598][T15417] CPU: 1 PID: 15417 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1272.161700][T15417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.171739][T15417] Call Trace: [ 1272.175022][T15417] dump_stack+0x172/0x1f0 [ 1272.179351][T15417] should_fail.cold+0xa/0x15 [ 1272.183933][T15417] ? fault_create_debugfs_attr+0x180/0x180 [ 1272.189727][T15417] ? perf_trace_lock+0xeb/0x4c0 [ 1272.194566][T15417] ? __kasan_check_read+0x11/0x20 [ 1272.199586][T15417] should_fail_alloc_page+0x50/0x60 [ 1272.204766][T15417] __alloc_pages_nodemask+0x1a1/0x900 [ 1272.210123][T15417] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1272.215745][T15417] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1272.221449][T15417] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1272.227076][T15417] ? fault_create_debugfs_attr+0x180/0x180 [ 1272.232872][T15417] cache_grow_begin+0x90/0xd20 [ 1272.237623][T15417] ? getname_flags+0xd6/0x5b0 [ 1272.242288][T15417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1272.248691][T15417] kmem_cache_alloc+0x64e/0x710 [ 1272.253538][T15417] getname_flags+0xd6/0x5b0 [ 1272.258031][T15417] getname+0x1a/0x20 [ 1272.261912][T15417] do_sys_open+0x2c9/0x5d0 [ 1272.266319][T15417] ? filp_open+0x80/0x80 [ 1272.270553][T15417] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1272.275995][T15417] ? do_syscall_64+0x26/0x760 [ 1272.280661][T15417] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1272.286720][T15417] ? do_syscall_64+0x26/0x760 [ 1272.291395][T15417] __x64_sys_open+0x7e/0xc0 [ 1272.295888][T15417] do_syscall_64+0xfa/0x760 [ 1272.300388][T15417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1272.306267][T15417] RIP: 0033:0x413761 [ 1272.310149][T15417] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1272.329738][T15417] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1272.338133][T15417] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1272.346088][T15417] RDX: 00007fb5ecd40b0a RSI: 0000000000000002 RDI: 00007fb5ecd40b00 [ 1272.354046][T15417] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1272.362003][T15417] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1272.369957][T15417] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:58:34 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:34 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4, 0x0) socket(0x9, 0x2, 0x5) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0x1, 0x400000004, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x6]}}}) 09:58:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:34 executing program 0 (fault-call:4 fault-nth:12): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:58:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x40000000006, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x0) write$binfmt_aout(r0, 0x0, 0x0) [ 1279.190384][T15441] FAULT_INJECTION: forcing a failure. [ 1279.190384][T15441] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.222572][T15441] CPU: 0 PID: 15441 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 09:58:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1279.231751][T15441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.241820][T15441] Call Trace: [ 1279.245125][T15441] dump_stack+0x172/0x1f0 [ 1279.249478][T15441] should_fail.cold+0xa/0x15 [ 1279.254100][T15441] ? fault_create_debugfs_attr+0x180/0x180 [ 1279.259934][T15441] ? ___might_sleep+0x163/0x280 [ 1279.264815][T15441] __should_failslab+0x121/0x190 [ 1279.269777][T15441] should_failslab+0x9/0x14 [ 1279.274299][T15441] __kmalloc+0x2e0/0x770 [ 1279.278558][T15441] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1279.284714][T15441] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1279.284740][T15441] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1279.284760][T15441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1279.284799][T15441] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1279.284822][T15441] ? cache_grow_begin.cold+0x13/0x2f [ 1279.313482][T15441] ? tomoyo_path_number_perm+0x520/0x520 [ 1279.319130][T15441] ? debug_smp_processor_id+0x3c/0x214 [ 1279.324632][T15441] ? __lockdep_free_key_range+0x120/0x120 [ 1279.330363][T15441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.330419][T15441] ? lock_downgrade+0x920/0x920 [ 1279.341485][T15441] ? rwlock_bug.part.0+0x90/0x90 [ 1279.341529][T15441] tomoyo_file_open+0xa9/0xd0 [ 1279.351122][T15441] security_file_open+0x71/0x300 [ 1279.356084][T15441] do_dentry_open+0x373/0x1250 [ 1279.360865][T15441] ? __kasan_check_read+0x11/0x20 [ 1279.365924][T15441] ? chown_common+0x5c0/0x5c0 [ 1279.370629][T15441] ? inode_permission+0xb4/0x560 [ 1279.375595][T15441] vfs_open+0xa0/0xd0 [ 1279.379587][T15441] path_openat+0x10e9/0x46d0 [ 1279.384181][T15441] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1279.389998][T15441] ? kasan_slab_alloc+0xf/0x20 [ 1279.394782][T15441] ? kmem_cache_alloc+0x121/0x710 [ 1279.399829][T15441] ? getname_flags+0xd6/0x5b0 [ 1279.404525][T15441] ? getname+0x1a/0x20 [ 1279.408617][T15441] ? do_sys_open+0x2c9/0x5d0 [ 1279.413251][T15441] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1279.418648][T15441] ? __lockdep_free_key_range+0x120/0x120 [ 1279.424394][T15441] ? __alloc_fd+0x487/0x620 [ 1279.428921][T15441] do_filp_open+0x1a1/0x280 [ 1279.433436][T15441] ? may_open_dev+0x100/0x100 [ 1279.438124][T15441] ? __kasan_check_read+0x11/0x20 [ 1279.443141][T15441] ? do_raw_spin_unlock+0x57/0x270 [ 1279.448247][T15441] ? _raw_spin_unlock+0x2d/0x50 [ 1279.453090][T15441] ? __alloc_fd+0x487/0x620 [ 1279.457604][T15441] do_sys_open+0x3fe/0x5d0 [ 1279.462014][T15441] ? filp_open+0x80/0x80 [ 1279.466251][T15441] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1279.471699][T15441] ? do_syscall_64+0x26/0x760 [ 1279.476366][T15441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.482422][T15441] ? do_syscall_64+0x26/0x760 [ 1279.487098][T15441] __x64_sys_open+0x7e/0xc0 [ 1279.491597][T15441] do_syscall_64+0xfa/0x760 [ 1279.496102][T15441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.501982][T15441] RIP: 0033:0x413761 [ 1279.505866][T15441] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1279.525773][T15441] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1279.534173][T15441] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1279.542143][T15441] RDX: 00007fb5ecd40b0a RSI: 0000000000000002 RDI: 00007fb5ecd40b00 [ 1279.550113][T15441] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1279.558073][T15441] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1279.566040][T15441] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1279.680155][T15441] ERROR: Out of memory at tomoyo_realpath_from_path. 09:58:43 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:43 executing program 2: 09:58:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:43 executing program 4: 09:58:43 executing program 0 (fault-call:4 fault-nth:13): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:58:43 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:43 executing program 2: 09:58:43 executing program 4: [ 1287.590712][T15467] FAULT_INJECTION: forcing a failure. [ 1287.590712][T15467] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.625387][T15467] CPU: 0 PID: 15467 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1287.634541][T15467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.644617][T15467] Call Trace: [ 1287.647921][T15467] dump_stack+0x172/0x1f0 [ 1287.652304][T15467] should_fail.cold+0xa/0x15 [ 1287.656928][T15467] ? fault_create_debugfs_attr+0x180/0x180 [ 1287.662762][T15467] ? ___might_sleep+0x163/0x280 [ 1287.667642][T15467] __should_failslab+0x121/0x190 [ 1287.672608][T15467] should_failslab+0x9/0x14 [ 1287.677110][T15467] kmem_cache_alloc+0x2aa/0x710 [ 1287.677136][T15467] ? kmem_cache_alloc+0x364/0x710 09:58:43 executing program 2: [ 1287.677169][T15467] security_file_alloc+0x39/0x170 [ 1287.677197][T15467] __alloc_file+0xde/0x340 [ 1287.677219][T15467] alloc_empty_file+0x72/0x170 [ 1287.692083][T15467] path_openat+0xef/0x46d0 [ 1287.706551][T15467] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1287.712368][T15467] ? kasan_slab_alloc+0xf/0x20 [ 1287.717145][T15467] ? kmem_cache_alloc+0x121/0x710 [ 1287.722181][T15467] ? getname_flags+0xd6/0x5b0 [ 1287.726871][T15467] ? getname+0x1a/0x20 [ 1287.730955][T15467] ? do_sys_open+0x2c9/0x5d0 [ 1287.735560][T15467] ? __x64_sys_open+0x7e/0xc0 [ 1287.740253][T15467] ? __kasan_check_read+0x11/0x20 [ 1287.745298][T15467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.751559][T15467] ? debug_smp_processor_id+0x3c/0x214 [ 1287.757040][T15467] ? perf_trace_lock+0xeb/0x4c0 [ 1287.761910][T15467] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1287.767303][T15467] ? __lockdep_free_key_range+0x120/0x120 [ 1287.773047][T15467] ? __alloc_fd+0x487/0x620 [ 1287.777577][T15467] do_filp_open+0x1a1/0x280 [ 1287.782091][T15467] ? may_open_dev+0x100/0x100 [ 1287.786782][T15467] ? lock_downgrade+0x920/0x920 09:58:43 executing program 2: 09:58:43 executing program 4: [ 1287.791640][T15467] ? rwlock_bug.part.0+0x90/0x90 [ 1287.796591][T15467] ? __kasan_check_read+0x11/0x20 [ 1287.801642][T15467] ? do_raw_spin_unlock+0x57/0x270 [ 1287.806773][T15467] ? _raw_spin_unlock+0x2d/0x50 [ 1287.811647][T15467] ? __alloc_fd+0x487/0x620 [ 1287.816194][T15467] do_sys_open+0x3fe/0x5d0 [ 1287.820635][T15467] ? filp_open+0x80/0x80 [ 1287.824909][T15467] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1287.830386][T15467] ? do_syscall_64+0x26/0x760 [ 1287.835077][T15467] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 09:58:43 executing program 2: [ 1287.841239][T15467] ? do_syscall_64+0x26/0x760 [ 1287.845944][T15467] __x64_sys_open+0x7e/0xc0 [ 1287.850474][T15467] do_syscall_64+0xfa/0x760 [ 1287.855006][T15467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1287.860909][T15467] RIP: 0033:0x413761 [ 1287.864822][T15467] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1287.884438][T15467] RSP: 002b:00007fb5ecd40a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1287.892862][T15467] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1287.900863][T15467] RDX: 00007fb5ecd40b0a RSI: 0000000000000002 RDI: 00007fb5ecd40b00 [ 1287.908836][T15467] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1287.908848][T15467] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1287.908858][T15467] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:58:54 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:54 executing program 4: 09:58:54 executing program 2: 09:58:54 executing program 0 (fault-call:4 fault-nth:14): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:58:54 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:58:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1298.933698][T15490] FAULT_INJECTION: forcing a failure. [ 1298.933698][T15490] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.963463][T15490] CPU: 1 PID: 15490 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1298.972604][T15490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:58:54 executing program 4: 09:58:54 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, 0x0}, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) [ 1298.982661][T15490] Call Trace: [ 1298.985958][T15490] dump_stack+0x172/0x1f0 [ 1298.990307][T15490] should_fail.cold+0xa/0x15 [ 1298.994903][T15490] ? fault_create_debugfs_attr+0x180/0x180 [ 1299.000794][T15490] ? ___might_sleep+0x163/0x280 [ 1299.005654][T15490] __should_failslab+0x121/0x190 [ 1299.010583][T15490] should_failslab+0x9/0x14 [ 1299.015067][T15490] __kmalloc+0x2e0/0x770 [ 1299.019296][T15490] ? mark_held_locks+0xf0/0xf0 [ 1299.024051][T15490] ? __kasan_check_read+0x11/0x20 [ 1299.029066][T15490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.035289][T15490] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1299.040990][T15490] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1299.046534][T15490] ? tomoyo_path_number_perm+0x193/0x520 [ 1299.052159][T15490] tomoyo_path_number_perm+0x1dd/0x520 [ 1299.057593][T15490] ? tomoyo_path_number_perm+0x193/0x520 [ 1299.063217][T15490] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1299.069036][T15490] ? __fget+0x384/0x560 [ 1299.073173][T15490] ? ksys_dup3+0x3e0/0x3e0 [ 1299.077588][T15490] ? do_sys_open+0x31d/0x5d0 [ 1299.082160][T15490] tomoyo_file_ioctl+0x23/0x30 [ 1299.086918][T15490] security_file_ioctl+0x77/0xc0 [ 1299.091846][T15490] ksys_ioctl+0x57/0xd0 [ 1299.095981][T15490] __x64_sys_ioctl+0x73/0xb0 [ 1299.100555][T15490] do_syscall_64+0xfa/0x760 [ 1299.105057][T15490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.110938][T15490] RIP: 0033:0x4596e7 [ 1299.114829][T15490] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.134411][T15490] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1299.142808][T15490] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1299.150779][T15490] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1299.158735][T15490] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1299.166695][T15490] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1299.174658][T15490] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1299.185036][T15490] ERROR: Out of memory at tomoyo_realpath_from_path. 09:58:54 executing program 4: creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xd8}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x0, 0x0) 09:58:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:58:55 executing program 0 (fault-call:4 fault-nth:15): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1299.390925][ T26] audit: type=1804 audit(1567245535.051:48): pid=15505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir141153277/syzkaller.j0KNo6/11/bus" dev="sda1" ino=16486 res=1 [ 1299.464674][ T26] audit: type=1804 audit(1567245535.051:49): pid=15505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir141153277/syzkaller.j0KNo6/11/bus" dev="sda1" ino=16486 res=1 [ 1299.537295][T15514] FAULT_INJECTION: forcing a failure. [ 1299.537295][T15514] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.551654][T15514] CPU: 0 PID: 15514 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1299.560793][T15514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.570848][T15514] Call Trace: [ 1299.574141][T15514] dump_stack+0x172/0x1f0 [ 1299.574171][T15514] should_fail.cold+0xa/0x15 [ 1299.583070][T15514] ? fault_create_debugfs_attr+0x180/0x180 [ 1299.588859][T15514] ? ___might_sleep+0x163/0x280 [ 1299.588878][T15514] __should_failslab+0x121/0x190 [ 1299.588896][T15514] should_failslab+0x9/0x14 [ 1299.598661][T15514] __kmalloc+0x2e0/0x770 [ 1299.598678][T15514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.598694][T15514] ? d_absolute_path+0x11b/0x170 [ 1299.607391][T15514] ? __d_path+0x140/0x140 [ 1299.607403][T15514] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1299.607420][T15514] tomoyo_encode2.part.0+0xf5/0x400 [ 1299.618667][T15514] tomoyo_encode+0x2b/0x50 [ 1299.618678][T15514] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1299.618701][T15514] tomoyo_path_number_perm+0x1dd/0x520 [ 1299.648997][T15514] ? tomoyo_path_number_perm+0x193/0x520 [ 1299.654621][T15514] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1299.660443][T15514] ? __fget+0x384/0x560 [ 1299.664591][T15514] ? ksys_dup3+0x3e0/0x3e0 [ 1299.669009][T15514] ? do_sys_open+0x31d/0x5d0 [ 1299.673705][T15514] tomoyo_file_ioctl+0x23/0x30 [ 1299.678492][T15514] security_file_ioctl+0x77/0xc0 [ 1299.683415][T15514] ksys_ioctl+0x57/0xd0 [ 1299.687556][T15514] __x64_sys_ioctl+0x73/0xb0 [ 1299.692146][T15514] do_syscall_64+0xfa/0x760 [ 1299.696639][T15514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.702522][T15514] RIP: 0033:0x4596e7 [ 1299.706412][T15514] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.725997][T15514] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1299.734553][T15514] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1299.742545][T15514] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1299.750522][T15514] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1299.758478][T15514] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1299.766436][T15514] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1299.776733][T15514] ERROR: Out of memory at tomoyo_realpath_from_path. 09:59:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc0, &(0x7f0000000c80)=ANY=[@ANYBLOB='inode64,prjquota,prjquota,logdev=.']) 09:59:07 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:07 executing program 0 (fault-call:4 fault-nth:16): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae89, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000000800f21e01"]) 09:59:07 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1312.308211][T15531] XFS (loop4): Invalid device [.], error=-15 [ 1312.317148][T15535] FAULT_INJECTION: forcing a failure. [ 1312.317148][T15535] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.334186][T15533] kvm [15530]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 [ 1312.352530][T15535] CPU: 1 PID: 15535 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1312.361654][T15535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.371699][T15535] Call Trace: [ 1312.374986][T15535] dump_stack+0x172/0x1f0 [ 1312.379308][T15535] should_fail.cold+0xa/0x15 [ 1312.383884][T15535] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.389850][T15535] ? ___might_sleep+0x163/0x280 [ 1312.394686][T15535] __should_failslab+0x121/0x190 [ 1312.399607][T15535] should_failslab+0x9/0x14 [ 1312.404092][T15535] kmem_cache_alloc_trace+0x2d3/0x790 [ 1312.409451][T15535] ? lockdep_init_map+0x1be/0x6d0 [ 1312.414535][T15535] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1312.419979][T15535] __kthread_create_on_node+0xf2/0x460 [ 1312.425422][T15535] ? lock_acquire+0x190/0x410 [ 1312.430082][T15535] ? kthread_parkme+0xb0/0xb0 [ 1312.434749][T15535] ? loop_set_fd+0x659/0x1020 [ 1312.439408][T15535] ? do_raw_spin_unlock+0x57/0x270 [ 1312.444513][T15535] ? mutex_lock_io_nested+0x1260/0x1260 [ 1312.450043][T15535] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1312.455484][T15535] kthread_create_on_node+0xbb/0xf0 [ 1312.460664][T15535] ? __kthread_create_on_node+0x460/0x460 [ 1312.466372][T15535] ? lockdep_init_map+0x1be/0x6d0 [ 1312.471382][T15535] ? lockdep_init_map+0x1be/0x6d0 [ 1312.476397][T15535] loop_set_fd+0x312/0x1020 [ 1312.480888][T15535] lo_ioctl+0x1a3/0x1460 [ 1312.485121][T15535] ? loop_set_fd+0x1020/0x1020 [ 1312.489869][T15535] blkdev_ioctl+0xedb/0x1c20 [ 1312.494441][T15535] ? blkpg_ioctl+0xa90/0xa90 [ 1312.499016][T15535] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1312.504818][T15535] block_ioctl+0xee/0x130 [ 1312.509127][T15535] ? blkdev_fallocate+0x410/0x410 [ 1312.514142][T15535] do_vfs_ioctl+0xdb6/0x13e0 [ 1312.518720][T15535] ? ioctl_preallocate+0x210/0x210 [ 1312.523811][T15535] ? __fget+0x384/0x560 [ 1312.527952][T15535] ? ksys_dup3+0x3e0/0x3e0 [ 1312.532359][T15535] ? do_sys_open+0x31d/0x5d0 [ 1312.536965][T15535] ? tomoyo_file_ioctl+0x23/0x30 [ 1312.541889][T15535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1312.548113][T15535] ? security_file_ioctl+0x8d/0xc0 [ 1312.553226][T15535] ksys_ioctl+0xab/0xd0 [ 1312.557366][T15535] __x64_sys_ioctl+0x73/0xb0 [ 1312.561945][T15535] do_syscall_64+0xfa/0x760 [ 1312.566438][T15535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.572311][T15535] RIP: 0033:0x4596e7 [ 1312.576191][T15535] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.595886][T15535] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1312.604278][T15535] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1312.612231][T15535] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1312.620183][T15535] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1312.628136][T15535] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1312.636088][T15535] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:08 executing program 0 (fault-call:4 fault-nth:17): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1312.720797][T15542] XFS (loop4): Invalid device [.], error=-15 09:59:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000001100)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2000007, 0x100000000000032, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000014) 09:59:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r1, r3, 0x0, 0x800000000024) 09:59:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1312.883725][T15550] FAULT_INJECTION: forcing a failure. [ 1312.883725][T15550] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1312.896956][T15550] CPU: 1 PID: 15550 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1312.906056][T15550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.906064][T15550] Call Trace: [ 1312.906089][T15550] dump_stack+0x172/0x1f0 [ 1312.906115][T15550] should_fail.cold+0xa/0x15 [ 1312.906136][T15550] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.906156][T15550] ? lock_downgrade+0x920/0x920 [ 1312.906181][T15550] should_fail_alloc_page+0x50/0x60 [ 1312.944205][T15550] __alloc_pages_nodemask+0x1a1/0x900 [ 1312.949589][T15550] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1312.955313][T15550] ? __kasan_check_read+0x11/0x20 [ 1312.960369][T15550] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.966186][T15550] cache_grow_begin+0x90/0xd20 [ 1312.970962][T15550] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1312.976781][T15550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1312.983029][T15550] __kmalloc+0x6b2/0x770 [ 1312.987278][T15550] ? mark_held_locks+0xf0/0xf0 [ 1312.992056][T15550] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1312.997780][T15550] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1312.997801][T15550] ? tomoyo_path_number_perm+0x193/0x520 [ 1312.997825][T15550] tomoyo_path_number_perm+0x1dd/0x520 [ 1313.014419][T15550] ? tomoyo_path_number_perm+0x193/0x520 [ 1313.020068][T15550] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1313.025927][T15550] ? __fget+0x384/0x560 [ 1313.030092][T15550] ? ksys_dup3+0x3e0/0x3e0 [ 1313.030114][T15550] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1313.030136][T15550] tomoyo_file_ioctl+0x23/0x30 [ 1313.044832][T15550] security_file_ioctl+0x77/0xc0 [ 1313.049784][T15550] ksys_ioctl+0x57/0xd0 [ 1313.053955][T15550] __x64_sys_ioctl+0x73/0xb0 [ 1313.058559][T15550] do_syscall_64+0xfa/0x760 [ 1313.063082][T15550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.068975][T15550] RIP: 0033:0x4596e7 [ 1313.072875][T15550] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.092659][T15550] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1313.101077][T15550] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1313.109061][T15550] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1313.117044][T15550] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1313.125018][T15550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1313.133041][T15550] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1313.172468][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1313.178311][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:59:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:19 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:19 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'nr0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001740)={'nlmon0\x00', r1}) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000001780)) ioctl$TIOCSBRK(r0, 0x5427) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000017c0)={0x0, 0x5b, "175a15db4e6132c56788b3e906c9eed68c6a7f3a137d687345d387070a85ddd0ffd52a2f6e4d88a4035bed368dd67b3973ee0acd9724609ad9dc4f124c490817443344f139ec8f735755469a2658e817d98362d4cc5dd0e7f2ad78"}, &(0x7f0000001840)=0x63) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001880)={0x9, 0xa, 0x3ff, 0x2, 0x0}, &(0x7f00000018c0)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001900)={r2, 0x1, 0x80, 0x4, 0x8000, 0x9, 0x9, 0xfff, {r3, @in6={{0xa, 0x4e21, 0x3ff, @ipv4={[], [], @rand_addr=0x4ba0}, 0x6}}, 0xf5e5, 0x57, 0x1, 0xff, 0x69a8}}, &(0x7f00000019c0)=0xb0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000001a40)={&(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0], 0x4}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000001a80)="748cbc2437d9a65ebbd30887b96b275a8c5c98e0f638a9cbf45f91d8f80d0b2397bd2ed7fc1786a41026dbb828663a191942b68d051055ef8bc57eb950f4e915036c4380bed05c29fe93311981bb1f6717", 0x51) tee(r0, r0, 0x1, 0x8) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000001b00)={0x2c, 0x4, 0x0, {0x1, 0x2, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001b40)={r4, 0x10001}, &(0x7f0000001b80)=0x8) lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000001bc0)='./file0\x00', r5, r6, 0x100) r7 = request_key(&(0x7f0000001d80)='id_resolver\x00', &(0x7f0000001dc0)={'syz', 0x3}, &(0x7f0000001e00)='nr0\x00', 0x0) r8 = add_key$user(&(0x7f0000002200)='user\x00', &(0x7f0000002240)={'syz', 0x0}, &(0x7f0000002280)="574714934b6da5ccc6f968d02a717ab218325b61d18d2e2e7c8c89f8a3fb7085ed4c2c782fe2732834a84cd4c050a7b10fb05730f0d89730b33b9517d8b9fe739b7f902189e72c67a0422e6ea34483a3faf167764ed06bd91c73489d828c0025cfc39d5f1b96744674e7c50293aca580b93ff7608460fcb0023ce8ad1b254ef5f2fd20781d29f2862d3e9456088ab608a3b25a0a5673bb", 0x97, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r7, &(0x7f0000002180)=[{&(0x7f0000001e40)="9ac27073b5352159c29ea7fcf84e3fcf2486ca15f7f34994e41e8b2478d4db3ff4c025381a85e20415b4692d0c927bbdb649dea83c55f1c53e60bb948cdc55815362bd4b09e26a5e59d4c1c6a5150401d0a68799d50ee35e000abf02b3b839b1a258000db109c89c2b88a5f2692bdcd054bc96e731dac7da0b28a4507af04e6aa57174b8b5988b2d1b19227db439301277991c6cb1d54791528b8284b67b02a293fe626d84443a785a79c90d8a098cb500ed2dd9f95469c491db52e85582f6643a32c92ac1e0c6b4bdf00b9b1d21c67742e7c73a8fc1d037cc30aee996807dd9", 0xe0}, {&(0x7f0000001f40)="5e16e004c4137658cf5df20772578bacb35c6bb964c15fa6c1cb29d0b17060d270224f7d6aadf814a788e580ffb77352c16828280d646d3dff6195c7e05dffb2", 0x40}, {&(0x7f0000001f80)="bf9d85217b7ee485765fdfcee238337d02656e1f41bf13606d435080f3c327fdf6ca578419d1587a19b7a87f23b367057c1c0fa24658cfe14a5d5f77b323498676c63d4df369e539230ef272dc5c5c4d0fdbb5dfc281a53713ab5349c9ce73d265cf4cd2be1b55ee539a3c459de8b3a1e9d1576c8daf3ad97009b9d655ef74388fb3b8ad17de1d96723a4b5ff3c2fe5c3c47847e10863c6106a43ba5fd54b5b27dcfffaaf5959fe28706ba29be8fa87a31bb9ed2f378df9ee097d46ce65b6ba9428c5634", 0xc4}, {&(0x7f0000002080)="ddfd222679a72365cad3f5da37f9996d3b668921f67284b3aeb7c12fa3aba3d95f632d516bb365ae3208128811885ef2c7b479bc256cef31051c7c6c3bb77574243806dccadca6297980e0afbb59159c3f037fa9bf5eef20b14db4937b56f8ea469bedb5dcf553be394eb8915f363a92ac5ab47918f3d8e9885e3fbbb69f3ea70eb06fe4298daa17921a5be5c9726b3ec17818ce18aaf7e1", 0x98}, {&(0x7f0000002140)="8f1e0ccf1320f5caf531f206236598a32f07664bf8ab6fa7fcf991a7cb1e0042a6193232c5", 0x25}], 0x5, r8) set_robust_list(&(0x7f00000023c0)={&(0x7f0000002380)={&(0x7f0000002340)}, 0x5}, 0x18) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000002400)={0xffffffff, 0x2}) ioctl$CAPI_INSTALLED(r0, 0x80024322) getsockname$tipc(r0, &(0x7f0000002440)=@id, &(0x7f0000002480)=0x10) poll(&(0x7f00000024c0)=[{r0, 0x414}, {r0, 0x8000}, {r0, 0x7}, {r0, 0x40}], 0x4, 0x2) sysfs$3(0x3) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000002500)=""/165) pipe2$9p(&(0x7f00000025c0), 0x800) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000002600)={0x0, 0x1, @value=0x9}) r9 = pkey_alloc(0x0, 0x1) pkey_free(r9) 09:59:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:19 executing program 0 (fault-call:4 fault-nth:18): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:19 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:59:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000400)="90d64547359ba03613331d0bb28403103a65652346ecf0b0dc8d179180678e2c556172db2c018a72490d2c933c3d9914a4996314715ab85b9117701a5265426e0635b3c24706a10286ad137657ed960a5dc8d14882ac1b395a74f69a888b9cd13dce461f648f35a2e6e093338efab700d01371963500518a638e85b1a51d145af28a586f02ea476b47fcfcd076e2", 0x8e}, {&(0x7f00000004c0)="cd921e3f13a98e7859e97878de0f19482227a3efd0ab5cf301dd0e2aeecae0f32b8aa0700684b24e5821ece8df64a55c2643e0f110981fba7da6e7df4c1a230abbe8992764dff9222857ace9a87897f4096fab7df46bf758a95b65df8df9e4835c1225355047cf07ca3f6eec5bc158c7fba89bdfff0fe39685b95b709a3e55de5d21c1b21b622f5ec88401feb2ad723f6df47fce9f891e999ca2ef22", 0x9c}], 0x2, 0x0) mq_open(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f00000002c0)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x40046109, &(0x7f0000000000)) [ 1323.581939][T15585] FAULT_INJECTION: forcing a failure. [ 1323.581939][T15585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1323.595184][T15585] CPU: 1 PID: 15585 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1323.604291][T15585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.614346][T15585] Call Trace: [ 1323.617645][T15585] dump_stack+0x172/0x1f0 [ 1323.621991][T15585] should_fail.cold+0xa/0x15 [ 1323.626599][T15585] ? fault_create_debugfs_attr+0x180/0x180 09:59:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f00000000c0)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000100)={0x8000000, 0x4e46, 0x10}) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000005, 0x0, r0, 0x0}]) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0x2, 0x4, 0x80000000, 0x0, 0xf}) [ 1323.632416][T15585] ? lock_downgrade+0x920/0x920 [ 1323.637283][T15585] should_fail_alloc_page+0x50/0x60 [ 1323.642492][T15585] __alloc_pages_nodemask+0x1a1/0x900 [ 1323.647875][T15585] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1323.653601][T15585] ? __kasan_check_read+0x11/0x20 [ 1323.658637][T15585] ? fault_create_debugfs_attr+0x180/0x180 [ 1323.664456][T15585] cache_grow_begin+0x90/0xd20 [ 1323.669215][T15585] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1323.674919][T15585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1323.681150][T15585] __kmalloc+0x6b2/0x770 [ 1323.685374][T15585] ? mark_held_locks+0xf0/0xf0 [ 1323.690127][T15585] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1323.695854][T15585] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1323.701378][T15585] ? tomoyo_path_number_perm+0x193/0x520 [ 1323.707898][T15585] tomoyo_path_number_perm+0x1dd/0x520 [ 1323.713338][T15585] ? tomoyo_path_number_perm+0x193/0x520 [ 1323.718948][T15585] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1323.724758][T15585] ? __fget+0x384/0x560 [ 1323.728893][T15585] ? ksys_dup3+0x3e0/0x3e0 [ 1323.733293][T15585] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1323.738819][T15585] tomoyo_file_ioctl+0x23/0x30 [ 1323.743587][T15585] security_file_ioctl+0x77/0xc0 [ 1323.748506][T15585] ksys_ioctl+0x57/0xd0 [ 1323.752640][T15585] __x64_sys_ioctl+0x73/0xb0 [ 1323.757212][T15585] do_syscall_64+0xfa/0x760 [ 1323.761695][T15585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.767575][T15585] RIP: 0033:0x4596e7 [ 1323.771451][T15585] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1323.791031][T15585] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1323.799421][T15585] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1323.807372][T15585] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1323.815320][T15585] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1323.823284][T15585] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1323.831231][T15585] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:19 executing program 0 (fault-call:4 fault-nth:19): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x78, 0x0, 0xffffffffffffff1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/keycreate\x00') ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000080)=r2) [ 1324.199605][T15616] FAULT_INJECTION: forcing a failure. [ 1324.199605][T15616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1324.212844][T15616] CPU: 0 PID: 15616 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1324.212858][T15616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.212866][T15616] Call Trace: [ 1324.212895][T15616] dump_stack+0x172/0x1f0 [ 1324.212931][T15616] should_fail.cold+0xa/0x15 [ 1324.212958][T15616] ? fault_create_debugfs_attr+0x180/0x180 [ 1324.212984][T15616] ? lock_downgrade+0x920/0x920 [ 1324.213017][T15616] should_fail_alloc_page+0x50/0x60 [ 1324.213033][T15616] __alloc_pages_nodemask+0x1a1/0x900 [ 1324.213060][T15616] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1324.213079][T15616] ? __kasan_check_read+0x11/0x20 [ 1324.213108][T15616] ? fault_create_debugfs_attr+0x180/0x180 [ 1324.213134][T15616] cache_grow_begin+0x90/0xd20 [ 1324.255140][T15616] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1324.255164][T15616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1324.255192][T15616] __kmalloc+0x6b2/0x770 [ 1324.255211][T15616] ? mark_held_locks+0xf0/0xf0 [ 1324.255237][T15616] ? perf_trace_run_bpf_submit+0x138/0x190 [ 1324.255258][T15616] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1324.319530][T15616] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1324.325123][T15616] ? tomoyo_path_number_perm+0x193/0x520 [ 1324.330796][T15616] tomoyo_path_number_perm+0x1dd/0x520 [ 1324.336284][T15616] ? tomoyo_path_number_perm+0x193/0x520 [ 1324.341947][T15616] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1324.347841][T15616] ? __fget+0x384/0x560 [ 1324.352020][T15616] ? ksys_dup3+0x3e0/0x3e0 [ 1324.356466][T15616] ? do_sys_open+0x31d/0x5d0 [ 1324.361108][T15616] tomoyo_file_ioctl+0x23/0x30 [ 1324.365899][T15616] security_file_ioctl+0x77/0xc0 [ 1324.370861][T15616] ksys_ioctl+0x57/0xd0 [ 1324.375040][T15616] __x64_sys_ioctl+0x73/0xb0 [ 1324.379650][T15616] do_syscall_64+0xfa/0x760 [ 1324.384181][T15616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.390093][T15616] RIP: 0033:0x4596e7 [ 1324.393991][T15616] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1324.394002][T15616] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1324.394020][T15616] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1324.394032][T15616] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1324.394041][T15616] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1324.394051][T15616] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1324.394065][T15616] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:28 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x0, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:28 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x401]}}) 09:59:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:28 executing program 2: r0 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="5500000018007f1dfd0000b2a4a280930a80000000284308910000000e00080008000c00060000001940a30700000000000000001338d52f4400009bfb83de448daa7227c43ac9220000010cec4fab91d400000000", 0x55}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x0) 09:59:28 executing program 0 (fault-call:4 fault-nth:20): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:28 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 09:59:28 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x102) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 09:59:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0000a032a6903dd2bd280000000000"], 0x0, 0xf}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) r3 = getpid() write$apparmor_current(0xffffffffffffffff, &(0x7f00000002c0)=@profile={'changeprofile ', '/dev/kvm\x00'}, 0x17) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1332.818646][T15643] FAULT_INJECTION: forcing a failure. [ 1332.818646][T15643] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.841350][T15643] CPU: 0 PID: 15643 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1332.850497][T15643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.860559][T15643] Call Trace: [ 1332.863871][T15643] dump_stack+0x172/0x1f0 [ 1332.868242][T15643] should_fail.cold+0xa/0x15 [ 1332.872853][T15643] ? fault_create_debugfs_attr+0x180/0x180 [ 1332.878674][T15643] ? ___might_sleep+0x163/0x280 [ 1332.883543][T15643] __should_failslab+0x121/0x190 [ 1332.888505][T15643] should_failslab+0x9/0x14 [ 1332.893021][T15643] kmem_cache_alloc+0x2aa/0x710 [ 1332.897864][T15643] ? __mutex_lock+0x45d/0x13c0 [ 1332.902638][T15643] __kernfs_new_node+0xf0/0x6c0 [ 1332.907500][T15643] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1332.912953][T15643] ? wait_for_completion+0x440/0x440 [ 1332.918234][T15643] ? mutex_unlock+0xd/0x10 [ 1332.922650][T15643] ? kernfs_activate+0x192/0x1f0 [ 1332.927594][T15643] kernfs_new_node+0x96/0x120 [ 1332.932273][T15643] __kernfs_create_file+0x51/0x340 [ 1332.937401][T15643] sysfs_add_file_mode_ns+0x222/0x560 [ 1332.942779][T15643] internal_create_group+0x359/0xc40 [ 1332.948099][T15643] ? remove_files.isra.0+0x190/0x190 [ 1332.953395][T15643] ? __kasan_check_write+0x14/0x20 [ 1332.958514][T15643] ? up_write+0x155/0x490 [ 1332.962833][T15643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1332.969063][T15643] sysfs_create_group+0x20/0x30 [ 1332.973900][T15643] loop_set_fd+0xac1/0x1020 [ 1332.978423][T15643] lo_ioctl+0x1a3/0x1460 [ 1332.982663][T15643] ? loop_set_fd+0x1020/0x1020 [ 1332.987414][T15643] blkdev_ioctl+0xedb/0x1c20 [ 1332.991989][T15643] ? blkpg_ioctl+0xa90/0xa90 [ 1332.996583][T15643] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1333.002422][T15643] block_ioctl+0xee/0x130 [ 1333.006744][T15643] ? blkdev_fallocate+0x410/0x410 [ 1333.011772][T15643] do_vfs_ioctl+0xdb6/0x13e0 [ 1333.016350][T15643] ? ioctl_preallocate+0x210/0x210 [ 1333.021445][T15643] ? __fget+0x384/0x560 [ 1333.025611][T15643] ? ksys_dup3+0x3e0/0x3e0 [ 1333.030028][T15643] ? do_sys_open+0x31d/0x5d0 [ 1333.034618][T15643] ? tomoyo_file_ioctl+0x23/0x30 [ 1333.039574][T15643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1333.045822][T15643] ? security_file_ioctl+0x8d/0xc0 [ 1333.050920][T15643] ksys_ioctl+0xab/0xd0 [ 1333.055066][T15643] __x64_sys_ioctl+0x73/0xb0 [ 1333.059656][T15643] do_syscall_64+0xfa/0x760 [ 1333.064154][T15643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.070028][T15643] RIP: 0033:0x4596e7 [ 1333.073913][T15643] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1333.093505][T15643] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1333.101899][T15643] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1333.109853][T15643] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1333.117814][T15643] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1333.125785][T15643] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1333.133739][T15643] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget(0x1, 0x2) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000002c0)=""/4096) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x40000, @mcast2, 0x200000000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000000), 0x262) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') sendfile(r2, r3, 0x0, 0x88002) ioctl$int_in(r2, 0x5452, &(0x7f0000000180)=0x5) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, 0x0, 0x0) 09:59:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:29 executing program 0 (fault-call:4 fault-nth:21): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1333.548861][T15673] FAULT_INJECTION: forcing a failure. [ 1333.548861][T15673] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.562244][T15673] CPU: 1 PID: 15673 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1333.571355][T15673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.581393][T15673] Call Trace: [ 1333.584669][T15673] dump_stack+0x172/0x1f0 [ 1333.588980][T15673] should_fail.cold+0xa/0x15 [ 1333.593559][T15673] ? fault_create_debugfs_attr+0x180/0x180 [ 1333.599351][T15673] ? ___might_sleep+0x163/0x280 [ 1333.604186][T15673] __should_failslab+0x121/0x190 [ 1333.609120][T15673] should_failslab+0x9/0x14 [ 1333.613603][T15673] kmem_cache_alloc+0x2aa/0x710 [ 1333.618441][T15673] __kernfs_new_node+0xf0/0x6c0 [ 1333.623272][T15673] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1333.628714][T15673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1333.634936][T15673] ? debug_smp_processor_id+0x3c/0x214 [ 1333.640373][T15673] ? perf_trace_lock+0xeb/0x4c0 [ 1333.645207][T15673] kernfs_new_node+0x96/0x120 [ 1333.649964][T15673] kernfs_create_dir_ns+0x52/0x160 [ 1333.655057][T15673] internal_create_group+0x7f4/0xc40 [ 1333.660321][T15673] ? lock_downgrade+0x920/0x920 [ 1333.665152][T15673] ? remove_files.isra.0+0x190/0x190 [ 1333.670418][T15673] ? __kasan_check_write+0x14/0x20 [ 1333.675506][T15673] ? up_write+0x155/0x490 [ 1333.679819][T15673] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1333.686037][T15673] sysfs_create_group+0x20/0x30 [ 1333.690866][T15673] loop_set_fd+0xac1/0x1020 [ 1333.695352][T15673] lo_ioctl+0x1a3/0x1460 [ 1333.700516][T15673] ? loop_set_fd+0x1020/0x1020 [ 1333.705262][T15673] blkdev_ioctl+0xedb/0x1c20 [ 1333.709832][T15673] ? blkpg_ioctl+0xa90/0xa90 [ 1333.714404][T15673] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1333.720198][T15673] block_ioctl+0xee/0x130 [ 1333.724501][T15673] ? blkdev_fallocate+0x410/0x410 [ 1333.729516][T15673] do_vfs_ioctl+0xdb6/0x13e0 [ 1333.734093][T15673] ? ioctl_preallocate+0x210/0x210 [ 1333.739673][T15673] ? __fget+0x384/0x560 [ 1333.743813][T15673] ? ksys_dup3+0x3e0/0x3e0 [ 1333.748224][T15673] ? do_sys_open+0x31d/0x5d0 [ 1333.752799][T15673] ? tomoyo_file_ioctl+0x23/0x30 [ 1333.757725][T15673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1333.763959][T15673] ? security_file_ioctl+0x8d/0xc0 [ 1333.769046][T15673] ksys_ioctl+0xab/0xd0 [ 1333.773183][T15673] __x64_sys_ioctl+0x73/0xb0 [ 1333.777753][T15673] do_syscall_64+0xfa/0x760 [ 1333.782238][T15673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.788105][T15673] RIP: 0033:0x4596e7 [ 1333.791977][T15673] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1333.811561][T15673] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1333.819951][T15673] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1333.827903][T15673] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1333.835866][T15673] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1333.843828][T15673] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1333.851782][T15673] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:37 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x0, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:37 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x7, 0x8000, 0x62f6a3f6, 0x7a8}, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)="cd", 0x1, 0xfc, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800da0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xffffffffffffffff}, 0x1000000000000002}, 0x1c) 09:59:37 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffc, 0x40000) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000080)='ns/net\x00', 0xffffffffffffffff}, 0x30) write$P9_RGETLOCK(r2, &(0x7f0000000100)={0x25, 0x37, 0x1, {0x2, 0x8, 0x7f, r3, 0x7, 'ns/net\x00'}}, 0x25) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0xb701) 09:59:37 executing program 0 (fault-call:4 fault-nth:22): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:37 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) [ 1342.056365][T15686] FAULT_INJECTION: forcing a failure. [ 1342.056365][T15686] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.069636][T15686] CPU: 0 PID: 15686 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1342.078765][T15686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.088847][T15686] Call Trace: [ 1342.092175][T15686] dump_stack+0x172/0x1f0 [ 1342.096540][T15686] should_fail.cold+0xa/0x15 [ 1342.101157][T15686] ? fault_create_debugfs_attr+0x180/0x180 09:59:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:37 executing program 2: msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x84000, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x401009) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000340)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0x1000, @mcast2, 0x1}}}, 0x118) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES64, @ANYRESOCT, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES64, @ANYRES16, @ANYRES32], @ANYRES16, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRESOCT]], 0x7, 0x0) [ 1342.107029][T15686] ? stack_trace_save+0xac/0xe0 [ 1342.111916][T15686] __should_failslab+0x121/0x190 [ 1342.116877][T15686] should_failslab+0x9/0x14 [ 1342.121400][T15686] kmem_cache_alloc+0x47/0x710 [ 1342.126181][T15686] ? save_stack+0x5c/0x90 [ 1342.130522][T15686] ? save_stack+0x23/0x90 [ 1342.134871][T15686] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1342.140690][T15686] ? kasan_slab_alloc+0xf/0x20 [ 1342.145488][T15686] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1342.151843][T15686] idr_get_free+0x48e/0x8c0 [ 1342.156361][T15686] idr_alloc_u32+0x19e/0x330 [ 1342.160948][T15686] ? __fprop_inc_percpu_max+0x230/0x230 [ 1342.166497][T15686] ? mark_held_locks+0xf0/0xf0 [ 1342.171256][T15686] idr_alloc_cyclic+0x132/0x270 [ 1342.176101][T15686] ? idr_alloc+0x150/0x150 [ 1342.180521][T15686] __kernfs_new_node+0x172/0x6c0 [ 1342.185470][T15686] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1342.190938][T15686] ? perf_trace_lock+0x315/0x4c0 [ 1342.195899][T15686] kernfs_new_node+0x96/0x120 [ 1342.200579][T15686] kernfs_create_dir_ns+0x52/0x160 [ 1342.205698][T15686] internal_create_group+0x7f4/0xc40 [ 1342.210990][T15686] ? lock_downgrade+0x920/0x920 [ 1342.215856][T15686] ? remove_files.isra.0+0x190/0x190 [ 1342.221146][T15686] ? __kasan_check_write+0x14/0x20 [ 1342.226244][T15686] ? up_write+0x155/0x490 [ 1342.230560][T15686] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1342.236793][T15686] sysfs_create_group+0x20/0x30 [ 1342.241662][T15686] loop_set_fd+0xac1/0x1020 [ 1342.246163][T15686] lo_ioctl+0x1a3/0x1460 [ 1342.250396][T15686] ? loop_set_fd+0x1020/0x1020 [ 1342.255171][T15686] blkdev_ioctl+0xedb/0x1c20 [ 1342.259758][T15686] ? blkpg_ioctl+0xa90/0xa90 [ 1342.264353][T15686] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1342.270201][T15686] block_ioctl+0xee/0x130 [ 1342.274530][T15686] ? blkdev_fallocate+0x410/0x410 [ 1342.279568][T15686] do_vfs_ioctl+0xdb6/0x13e0 [ 1342.284177][T15686] ? ioctl_preallocate+0x210/0x210 [ 1342.289290][T15686] ? __fget+0x384/0x560 [ 1342.293458][T15686] ? ksys_dup3+0x3e0/0x3e0 [ 1342.297895][T15686] ? do_sys_open+0x31d/0x5d0 [ 1342.302512][T15686] ? tomoyo_file_ioctl+0x23/0x30 [ 1342.307451][T15686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1342.313696][T15686] ? security_file_ioctl+0x8d/0xc0 [ 1342.318810][T15686] ksys_ioctl+0xab/0xd0 [ 1342.322976][T15686] __x64_sys_ioctl+0x73/0xb0 [ 1342.327571][T15686] do_syscall_64+0xfa/0x760 [ 1342.332167][T15686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.338059][T15686] RIP: 0033:0x4596e7 [ 1342.341953][T15686] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.361558][T15686] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1342.370013][T15686] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1342.377979][T15686] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1342.385933][T15686] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1342.393912][T15686] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1342.401882][T15686] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x1, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4c5540c82e18770e, 0x1b071, 0xffffffffffffffff, 0x0) 09:59:38 executing program 4: prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffd000/0x3000)=nil) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4a42c9431156ef88, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES64=r0], &(0x7f0000000080)=0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r1, 0x90, 0x5, 0x7, 0x8001, 0x8, 0x0, 0x5, {r2, @in={{0x2, 0x4e22, @remote}}, 0x0, 0x6, 0x5, 0x9, 0x5}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0x4, 0x80000001, 0x6, 0xfff, 0x6, 0x8, 0xe63, {r3, @in6={{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x11}}}, 0x6, 0x400545e, 0x0, 0x0, 0x2}}, &(0x7f0000000300)=0xff5b) 09:59:38 executing program 0 (fault-call:4 fault-nth:23): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1342.769334][T15713] FAULT_INJECTION: forcing a failure. [ 1342.769334][T15713] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.784241][T15713] CPU: 0 PID: 15713 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1342.793351][T15713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.803424][T15713] Call Trace: [ 1342.806732][T15713] dump_stack+0x172/0x1f0 [ 1342.811057][T15713] should_fail.cold+0xa/0x15 [ 1342.815738][T15713] ? fault_create_debugfs_attr+0x180/0x180 [ 1342.821558][T15713] ? ___might_sleep+0x163/0x280 [ 1342.826422][T15713] __should_failslab+0x121/0x190 [ 1342.831375][T15713] should_failslab+0x9/0x14 [ 1342.835872][T15713] kmem_cache_alloc+0x2aa/0x710 [ 1342.840731][T15713] ? kernfs_activate+0x192/0x1f0 [ 1342.845665][T15713] ? __mutex_lock+0x45d/0x13c0 [ 1342.850419][T15713] __kernfs_new_node+0xf0/0x6c0 [ 1342.855258][T15713] ? __mutex_lock+0x45d/0x13c0 [ 1342.860011][T15713] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1342.865462][T15713] ? __kasan_check_write+0x14/0x20 [ 1342.870557][T15713] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1342.876091][T15713] ? wait_for_completion+0x440/0x440 [ 1342.881385][T15713] kernfs_new_node+0x96/0x120 [ 1342.886056][T15713] __kernfs_create_file+0x51/0x340 [ 1342.891158][T15713] sysfs_add_file_mode_ns+0x222/0x560 [ 1342.896527][T15713] internal_create_group+0x359/0xc40 [ 1342.901820][T15713] ? remove_files.isra.0+0x190/0x190 [ 1342.907110][T15713] ? __kasan_check_write+0x14/0x20 [ 1342.912210][T15713] ? up_write+0x155/0x490 [ 1342.916553][T15713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1342.922784][T15713] sysfs_create_group+0x20/0x30 [ 1342.927627][T15713] loop_set_fd+0xac1/0x1020 [ 1342.932126][T15713] lo_ioctl+0x1a3/0x1460 [ 1342.936382][T15713] ? loop_set_fd+0x1020/0x1020 [ 1342.941155][T15713] blkdev_ioctl+0xedb/0x1c20 [ 1342.945735][T15713] ? blkpg_ioctl+0xa90/0xa90 [ 1342.950318][T15713] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1342.956129][T15713] block_ioctl+0xee/0x130 [ 1342.960448][T15713] ? blkdev_fallocate+0x410/0x410 [ 1342.965461][T15713] do_vfs_ioctl+0xdb6/0x13e0 [ 1342.970043][T15713] ? ioctl_preallocate+0x210/0x210 [ 1342.975142][T15713] ? __fget+0x384/0x560 [ 1342.979301][T15713] ? ksys_dup3+0x3e0/0x3e0 [ 1342.983709][T15713] ? do_sys_open+0x31d/0x5d0 [ 1342.988289][T15713] ? tomoyo_file_ioctl+0x23/0x30 [ 1342.993215][T15713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1342.999462][T15713] ? security_file_ioctl+0x8d/0xc0 [ 1343.004583][T15713] ksys_ioctl+0xab/0xd0 [ 1343.008734][T15713] __x64_sys_ioctl+0x73/0xb0 [ 1343.013319][T15713] do_syscall_64+0xfa/0x760 [ 1343.017811][T15713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.023700][T15713] RIP: 0033:0x4596e7 [ 1343.027592][T15713] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1343.047190][T15713] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.055600][T15713] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1343.063557][T15713] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1343.071510][T15713] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1343.079467][T15713] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1343.087426][T15713] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 09:59:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c000000100001060000000000000000000000004215161251c5976a8d62a863992b3e48b997a8a80718d9f2785626a77e95bd82ea1bb146f16b21257027f524166fa79d0d2e00000000000000b74b0bbe995c02dcf8fefd6b311a181b3fe02273fc2e570808aef888eef3fa6d6cf3a1e0e9dab0b0a47eac28a04e71888686663fd7862a24d5d1000000000005000000000000000077bcd7f4cc945f355955463f0f2b863365c60722f9a0c5ada3268db9ce9b6bacddbde52d0d6d364f42743f49494ae26a4d346d1c1e612e2fe0466141c30a16348b", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00020008000400ffffffff"], 0x3c}}, 0x0) 09:59:46 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x0, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:46 executing program 0 (fault-call:4 fault-nth:24): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7fff, 0x40000) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'batadv0\x00'}) finit_module(r0, &(0x7f0000000100)='/dev/media#\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00\x06\bz\x00', 0xf7fffffffffffffd}) 09:59:46 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1351.343881][T15736] __nla_validate_parse: 12 callbacks suppressed [ 1351.343891][T15736] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1351.353445][T15733] FAULT_INJECTION: forcing a failure. [ 1351.353445][T15733] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.367526][T15734] device batadv0 entered promiscuous mode [ 1351.382032][T15733] CPU: 1 PID: 15733 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1351.391153][T15733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1351.401206][T15733] Call Trace: [ 1351.404507][T15733] dump_stack+0x172/0x1f0 [ 1351.408847][T15733] should_fail.cold+0xa/0x15 [ 1351.413452][T15733] ? fault_create_debugfs_attr+0x180/0x180 [ 1351.413995][T15734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1351.419265][T15733] ? ___might_sleep+0x163/0x280 [ 1351.419290][T15733] __should_failslab+0x121/0x190 [ 1351.419313][T15733] should_failslab+0x9/0x14 09:59:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:47 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x2018, 0x4) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x9}, 0xf) [ 1351.440395][T15733] kmem_cache_alloc+0x2aa/0x710 [ 1351.440415][T15733] ? __mutex_lock+0x45d/0x13c0 [ 1351.440441][T15733] __kernfs_new_node+0xf0/0x6c0 [ 1351.440460][T15733] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1351.460332][T15733] ? wait_for_completion+0x440/0x440 [ 1351.474056][T15733] ? mutex_unlock+0xd/0x10 [ 1351.478467][T15733] ? kernfs_activate+0x192/0x1f0 [ 1351.483402][T15733] kernfs_new_node+0x96/0x120 [ 1351.488071][T15733] __kernfs_create_file+0x51/0x340 [ 1351.493176][T15733] sysfs_add_file_mode_ns+0x222/0x560 [ 1351.498546][T15733] internal_create_group+0x359/0xc40 [ 1351.503840][T15733] ? remove_files.isra.0+0x190/0x190 [ 1351.509117][T15733] ? __kasan_check_write+0x14/0x20 [ 1351.514230][T15733] ? up_write+0x155/0x490 [ 1351.518555][T15733] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1351.524794][T15733] sysfs_create_group+0x20/0x30 [ 1351.529641][T15733] loop_set_fd+0xac1/0x1020 [ 1351.534143][T15733] lo_ioctl+0x1a3/0x1460 [ 1351.538382][T15733] ? loop_set_fd+0x1020/0x1020 [ 1351.543142][T15733] blkdev_ioctl+0xedb/0x1c20 [ 1351.547720][T15733] ? blkpg_ioctl+0xa90/0xa90 [ 1351.552297][T15733] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1351.558098][T15733] block_ioctl+0xee/0x130 [ 1351.562413][T15733] ? blkdev_fallocate+0x410/0x410 [ 1351.567428][T15733] do_vfs_ioctl+0xdb6/0x13e0 [ 1351.571997][T15733] ? ioctl_preallocate+0x210/0x210 [ 1351.577095][T15733] ? __fget+0x384/0x560 [ 1351.581240][T15733] ? ksys_dup3+0x3e0/0x3e0 [ 1351.585656][T15733] ? do_sys_open+0x31d/0x5d0 [ 1351.590250][T15733] ? tomoyo_file_ioctl+0x23/0x30 [ 1351.595185][T15733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1351.601422][T15733] ? security_file_ioctl+0x8d/0xc0 [ 1351.606524][T15733] ksys_ioctl+0xab/0xd0 [ 1351.610675][T15733] __x64_sys_ioctl+0x73/0xb0 [ 1351.615248][T15733] do_syscall_64+0xfa/0x760 [ 1351.619733][T15733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1351.625612][T15733] RIP: 0033:0x4596e7 [ 1351.629497][T15733] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1351.649076][T15733] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1351.657468][T15733] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1351.665424][T15733] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1351.673390][T15733] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1351.681349][T15733] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1351.689297][T15733] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1351.699037][T15734] device batadv0 left promiscuous mode 09:59:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:47 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3a, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x1000, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)={0x58, 0x101, "a4780a7e69846417d819351acb9b5da9aa0bfdcbac3853462f6d0a5ac723dbc93c040841eefe8713a09d06e342e3cd75dc5cacb40d1bdf600686b157d8bf4726ede5923a18c29ec57d75b4e6ebbcc3a3"}, 0x200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'b\x06\x00dge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180005001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000098d4e47bc5346d4879e1d5d55272a47bf1dfe4a390b38aebe5813bea5329aa5fb9a8949031efe77e5c41ede9307252516218c1c04b749948943e716dabd021b6847252bfb7479a0900b261f1cc731a133bfa99bfa9ce4dc3040c16a19345303ae1c58c61dfa5d7f28d"], 0x48}}, 0x0) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21) 09:59:47 executing program 0 (fault-call:4 fault-nth:25): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:47 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$rds(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e25, @remote}, 0x4e7) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="6768616e676568617420307830303030303030303038bc05ac35f8632efa7db3303030303030305e76626f786e657430002f61e1726f696d655f747970654723007d000000000038701468ee9e8017b140ad0dfa8423199a0dcc3486fea2bee208be72e554e3e6902fa9eaad88d12b96ccf9b7e2fac494d9b1a00da5d30a318756c8c585e6919f2dabea3ffa8712d857b965a8ca11"], 0x44) clone(0x84000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0xa00000000000000, 0x5, 0x0, 0x0, &(0x7f0000000040), 0xbffffffe) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 09:59:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1352.009846][T15762] FAULT_INJECTION: forcing a failure. [ 1352.009846][T15762] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.035726][T15762] CPU: 1 PID: 15762 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1352.044878][T15762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.054933][T15762] Call Trace: [ 1352.058237][T15762] dump_stack+0x172/0x1f0 [ 1352.062585][T15762] should_fail.cold+0xa/0x15 [ 1352.067192][T15762] ? fault_create_debugfs_attr+0x180/0x180 [ 1352.073008][T15762] ? ___might_sleep+0x163/0x280 [ 1352.077855][T15762] __should_failslab+0x121/0x190 [ 1352.082795][T15762] should_failslab+0x9/0x14 [ 1352.087322][T15762] kmem_cache_alloc_trace+0x2d3/0x790 [ 1352.092703][T15762] kobject_uevent_env+0x387/0x101d [ 1352.097824][T15762] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1352.104084][T15762] kobject_uevent+0x20/0x26 [ 1352.108587][T15762] loop_set_fd+0xb52/0x1020 [ 1352.108618][T15762] lo_ioctl+0x1a3/0x1460 [ 1352.117340][T15762] ? loop_set_fd+0x1020/0x1020 [ 1352.122114][T15762] blkdev_ioctl+0xedb/0x1c20 [ 1352.126704][T15762] ? blkpg_ioctl+0xa90/0xa90 [ 1352.126729][T15762] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1352.126764][T15762] block_ioctl+0xee/0x130 [ 1352.137115][T15762] ? blkdev_fallocate+0x410/0x410 [ 1352.137133][T15762] do_vfs_ioctl+0xdb6/0x13e0 [ 1352.137152][T15762] ? ioctl_preallocate+0x210/0x210 [ 1352.137167][T15762] ? __fget+0x384/0x560 [ 1352.137189][T15762] ? ksys_dup3+0x3e0/0x3e0 [ 1352.137208][T15762] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1352.137230][T15762] ? tomoyo_file_ioctl+0x23/0x30 [ 1352.137250][T15762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1352.137267][T15762] ? security_file_ioctl+0x8d/0xc0 [ 1352.137287][T15762] ksys_ioctl+0xab/0xd0 [ 1352.146600][T15762] __x64_sys_ioctl+0x73/0xb0 [ 1352.156260][T15762] do_syscall_64+0xfa/0x760 [ 1352.156285][T15762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1352.156298][T15762] RIP: 0033:0x4596e7 [ 1352.156314][T15762] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1352.156322][T15762] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1352.156336][T15762] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1352.156345][T15762] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1352.156352][T15762] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1352.156360][T15762] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1352.156368][T15762] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1352.184805][T15770] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program [ 1352.257976][T15771] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program 09:59:56 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x0, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\b', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000001c0)={0xffffffffffffffc0, 0x8000, 0x1, 'queue0\x00', 0x2}) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/209, 0xd1}], 0x1, 0x0) 09:59:56 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) syz_read_part_table(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\'security,mime_typeeth1\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) 09:59:56 executing program 0 (fault-call:4 fault-nth:26): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:59:56 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 09:59:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x0f', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:56 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) [ 1360.584548][T15789] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 1360.597392][T15793] FAULT_INJECTION: forcing a failure. [ 1360.597392][T15793] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.611854][T15793] CPU: 1 PID: 15793 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1360.620965][T15793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.631004][T15793] Call Trace: [ 1360.634285][T15793] dump_stack+0x172/0x1f0 [ 1360.638599][T15793] should_fail.cold+0xa/0x15 [ 1360.643170][T15793] ? fault_create_debugfs_attr+0x180/0x180 [ 1360.648961][T15793] ? ___might_sleep+0x163/0x280 [ 1360.653795][T15793] __should_failslab+0x121/0x190 [ 1360.658717][T15793] should_failslab+0x9/0x14 [ 1360.663200][T15793] __kmalloc+0x2e0/0x770 [ 1360.667426][T15793] ? kobject_get_path+0xc4/0x1b0 [ 1360.672349][T15793] kobject_get_path+0xc4/0x1b0 [ 1360.677108][T15793] kobject_uevent_env+0x3ab/0x101d [ 1360.682224][T15793] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1360.688503][T15793] kobject_uevent+0x20/0x26 [ 1360.692987][T15793] loop_set_fd+0xb52/0x1020 [ 1360.697476][T15793] lo_ioctl+0x1a3/0x1460 [ 1360.701701][T15793] ? loop_set_fd+0x1020/0x1020 [ 1360.706443][T15793] blkdev_ioctl+0xedb/0x1c20 [ 1360.711015][T15793] ? blkpg_ioctl+0xa90/0xa90 [ 1360.715606][T15793] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1360.721418][T15793] block_ioctl+0xee/0x130 [ 1360.725738][T15793] ? blkdev_fallocate+0x410/0x410 [ 1360.730771][T15793] do_vfs_ioctl+0xdb6/0x13e0 [ 1360.735353][T15793] ? ioctl_preallocate+0x210/0x210 [ 1360.740444][T15793] ? __fget+0x384/0x560 [ 1360.744583][T15793] ? ksys_dup3+0x3e0/0x3e0 [ 1360.748983][T15793] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1360.754518][T15793] ? tomoyo_file_ioctl+0x23/0x30 [ 1360.759435][T15793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1360.765677][T15793] ? security_file_ioctl+0x8d/0xc0 [ 1360.770785][T15793] ksys_ioctl+0xab/0xd0 [ 1360.774922][T15793] __x64_sys_ioctl+0x73/0xb0 [ 1360.779493][T15793] do_syscall_64+0xfa/0x760 [ 1360.783979][T15793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.789849][T15793] RIP: 0033:0x4596e7 [ 1360.793737][T15793] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.813332][T15793] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1360.821732][T15793] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1360.829679][T15793] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1360.837628][T15793] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1360.845579][T15793] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1360.853533][T15793] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1360.913463][T15789] __loop_clr_fd: partition scan of loop2 failed (rc=-13) 09:59:56 executing program 4: 09:59:56 executing program 2: 09:59:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 09:59:56 executing program 0 (fault-call:4 fault-nth:27): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1361.273835][T15821] FAULT_INJECTION: forcing a failure. [ 1361.273835][T15821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1361.287079][T15821] CPU: 0 PID: 15821 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1361.296194][T15821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.306256][T15821] Call Trace: [ 1361.309541][T15821] dump_stack+0x172/0x1f0 [ 1361.313884][T15821] should_fail.cold+0xa/0x15 [ 1361.318487][T15821] ? fault_create_debugfs_attr+0x180/0x180 [ 1361.324303][T15821] ? perf_trace_lock+0x315/0x4c0 [ 1361.329235][T15821] ? __kasan_check_read+0x11/0x20 [ 1361.334279][T15821] should_fail_alloc_page+0x50/0x60 [ 1361.339472][T15821] __alloc_pages_nodemask+0x1a1/0x900 [ 1361.344825][T15821] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1361.350441][T15821] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1361.356152][T15821] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1361.361796][T15821] ? fault_create_debugfs_attr+0x180/0x180 [ 1361.367605][T15821] cache_grow_begin+0x90/0xd20 [ 1361.372386][T15821] ? kobject_uevent_env+0x387/0x101d [ 1361.377683][T15821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.383925][T15821] kmem_cache_alloc_trace+0x6b3/0x790 [ 1361.389306][T15821] kobject_uevent_env+0x387/0x101d [ 1361.394426][T15821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1361.400671][T15821] kobject_uevent+0x20/0x26 [ 1361.405174][T15821] loop_set_fd+0xb52/0x1020 [ 1361.409671][T15821] lo_ioctl+0x1a3/0x1460 [ 1361.413927][T15821] ? loop_set_fd+0x1020/0x1020 [ 1361.418706][T15821] blkdev_ioctl+0xedb/0x1c20 [ 1361.423293][T15821] ? blkpg_ioctl+0xa90/0xa90 [ 1361.427870][T15821] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1361.433714][T15821] block_ioctl+0xee/0x130 [ 1361.438042][T15821] ? blkdev_fallocate+0x410/0x410 [ 1361.443069][T15821] do_vfs_ioctl+0xdb6/0x13e0 [ 1361.447657][T15821] ? ioctl_preallocate+0x210/0x210 [ 1361.452761][T15821] ? __fget+0x384/0x560 [ 1361.456939][T15821] ? ksys_dup3+0x3e0/0x3e0 [ 1361.461538][T15821] ? do_sys_open+0x31d/0x5d0 [ 1361.474525][T15821] ? tomoyo_file_ioctl+0x23/0x30 [ 1361.479466][T15821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1361.485699][T15821] ? security_file_ioctl+0x8d/0xc0 [ 1361.490809][T15821] ksys_ioctl+0xab/0xd0 [ 1361.494967][T15821] __x64_sys_ioctl+0x73/0xb0 [ 1361.499559][T15821] do_syscall_64+0xfa/0x760 [ 1361.504053][T15821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.509925][T15821] RIP: 0033:0x4596e7 [ 1361.513815][T15821] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.533429][T15821] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1361.541837][T15821] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1361.549790][T15821] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1361.557752][T15821] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1361.565720][T15821] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1361.573688][T15821] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:05 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x0, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:05 executing program 4: 10:00:05 executing program 2: 10:00:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:05 executing program 0 (fault-call:4 fault-nth:28): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:05 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:05 executing program 2: 10:00:05 executing program 4: [ 1369.742773][T15841] FAULT_INJECTION: forcing a failure. [ 1369.742773][T15841] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.765163][T15841] CPU: 1 PID: 15841 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1369.774289][T15841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.784341][T15841] Call Trace: [ 1369.787646][T15841] dump_stack+0x172/0x1f0 [ 1369.792000][T15841] should_fail.cold+0xa/0x15 [ 1369.796592][T15841] ? fault_create_debugfs_attr+0x180/0x180 [ 1369.802390][T15841] ? ___might_sleep+0x163/0x280 [ 1369.807245][T15841] __should_failslab+0x121/0x190 [ 1369.812170][T15841] should_failslab+0x9/0x14 [ 1369.816649][T15841] kmem_cache_alloc+0x2aa/0x710 [ 1369.821496][T15841] ? __mutex_lock+0x45d/0x13c0 [ 1369.826266][T15841] __kernfs_new_node+0xf0/0x6c0 [ 1369.831109][T15841] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1369.836550][T15841] ? wait_for_completion+0x440/0x440 [ 1369.841818][T15841] ? mutex_unlock+0xd/0x10 [ 1369.846225][T15841] ? kernfs_activate+0x192/0x1f0 [ 1369.851153][T15841] kernfs_new_node+0x96/0x120 [ 1369.855811][T15841] __kernfs_create_file+0x51/0x340 [ 1369.860967][T15841] sysfs_add_file_mode_ns+0x222/0x560 [ 1369.866340][T15841] internal_create_group+0x359/0xc40 [ 1369.871620][T15841] ? remove_files.isra.0+0x190/0x190 [ 1369.876887][T15841] ? __kasan_check_write+0x14/0x20 [ 1369.881977][T15841] ? up_write+0x155/0x490 [ 1369.886305][T15841] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1369.892563][T15841] sysfs_create_group+0x20/0x30 [ 1369.897403][T15841] loop_set_fd+0xac1/0x1020 [ 1369.901888][T15841] lo_ioctl+0x1a3/0x1460 [ 1369.906126][T15841] ? loop_set_fd+0x1020/0x1020 [ 1369.910879][T15841] blkdev_ioctl+0xedb/0x1c20 [ 1369.915448][T15841] ? blkpg_ioctl+0xa90/0xa90 [ 1369.920032][T15841] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1369.925846][T15841] block_ioctl+0xee/0x130 [ 1369.930161][T15841] ? blkdev_fallocate+0x410/0x410 [ 1369.935162][T15841] do_vfs_ioctl+0xdb6/0x13e0 [ 1369.939731][T15841] ? ioctl_preallocate+0x210/0x210 [ 1369.944829][T15841] ? __fget+0x384/0x560 [ 1369.948976][T15841] ? ksys_dup3+0x3e0/0x3e0 [ 1369.953370][T15841] ? do_sys_open+0x31d/0x5d0 [ 1369.957939][T15841] ? tomoyo_file_ioctl+0x23/0x30 [ 1369.962869][T15841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1369.969098][T15841] ? security_file_ioctl+0x8d/0xc0 [ 1369.974189][T15841] ksys_ioctl+0xab/0xd0 [ 1369.978319][T15841] __x64_sys_ioctl+0x73/0xb0 [ 1369.982898][T15841] do_syscall_64+0xfa/0x760 [ 1369.987407][T15841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.993286][T15841] RIP: 0033:0x4596e7 [ 1369.997165][T15841] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.016746][T15841] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1370.025145][T15841] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1370.033120][T15841] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 10:00:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1370.041067][T15841] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1370.049018][T15841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1370.056966][T15841] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:05 executing program 4: 10:00:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:05 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000080)="601070a7", 0xfdf5, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 10:00:14 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x0, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:14 executing program 0 (fault-call:4 fault-nth:29): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0xfffffffffffffffd) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000300)) r5 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) 10:00:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:14 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7}, 0x7) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x0, 0xffffffff}) 10:00:14 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1378.940767][T15874] FAULT_INJECTION: forcing a failure. [ 1378.940767][T15874] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.961795][T15874] CPU: 0 PID: 15874 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1378.962438][ T26] audit: type=1804 audit(1567245614.621:50): pid=15876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir715132310/syzkaller.pTgYbN/179/bus" dev="sda1" ino=16910 res=1 [ 1378.970934][T15874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.005358][T15874] Call Trace: [ 1379.008673][T15874] dump_stack+0x172/0x1f0 [ 1379.013029][T15874] should_fail.cold+0xa/0x15 [ 1379.017639][T15874] ? fault_create_debugfs_attr+0x180/0x180 [ 1379.023474][T15874] ? ___might_sleep+0x163/0x280 [ 1379.028352][T15874] __should_failslab+0x121/0x190 [ 1379.033320][T15874] should_failslab+0x9/0x14 [ 1379.037835][T15874] kmem_cache_alloc_trace+0x2d3/0x790 [ 1379.043242][T15874] kobject_uevent_env+0x387/0x101d [ 1379.048382][T15874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1379.054651][T15874] kobject_uevent+0x20/0x26 [ 1379.059176][T15874] loop_set_fd+0xb52/0x1020 [ 1379.063711][T15874] lo_ioctl+0x1a3/0x1460 [ 1379.067976][T15874] ? loop_set_fd+0x1020/0x1020 [ 1379.072757][T15874] blkdev_ioctl+0xedb/0x1c20 [ 1379.077359][T15874] ? blkpg_ioctl+0xa90/0xa90 [ 1379.081977][T15874] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1379.087832][T15874] block_ioctl+0xee/0x130 [ 1379.092172][T15874] ? blkdev_fallocate+0x410/0x410 [ 1379.097212][T15874] do_vfs_ioctl+0xdb6/0x13e0 [ 1379.101826][T15874] ? ioctl_preallocate+0x210/0x210 [ 1379.106950][T15874] ? __fget+0x384/0x560 [ 1379.111128][T15874] ? ksys_dup3+0x3e0/0x3e0 [ 1379.115565][T15874] ? do_sys_open+0x31d/0x5d0 [ 1379.120181][T15874] ? tomoyo_file_ioctl+0x23/0x30 [ 1379.125129][T15874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.131381][T15874] ? security_file_ioctl+0x8d/0xc0 [ 1379.136510][T15874] ksys_ioctl+0xab/0xd0 [ 1379.140683][T15874] __x64_sys_ioctl+0x73/0xb0 [ 1379.145290][T15874] do_syscall_64+0xfa/0x760 [ 1379.149812][T15874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.155716][T15874] RIP: 0033:0x4596e7 [ 1379.159621][T15874] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1379.179243][T15874] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:00:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) read(r1, 0x0, 0xffffff06) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x7) 10:00:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x0, 0xffffffff}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)='bpq0\x00', 0x0, 0xae, 0x6}) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) [ 1379.187658][T15874] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1379.195625][T15874] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1379.203583][T15874] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1379.211546][T15874] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1379.219501][T15874] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc, 0x0, &(0x7f0000000000)=0x300) 10:00:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1379.336790][ T26] audit: type=1804 audit(1567245615.001:51): pid=15891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir715132310/syzkaller.pTgYbN/180/bus" dev="sda1" ino=16911 res=1 10:00:15 executing program 0 (fault-call:4 fault-nth:30): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1379.634088][T15907] FAULT_INJECTION: forcing a failure. [ 1379.634088][T15907] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1379.647323][T15907] CPU: 1 PID: 15907 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1379.656425][T15907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.666480][T15907] Call Trace: [ 1379.669775][T15907] dump_stack+0x172/0x1f0 [ 1379.674116][T15907] should_fail.cold+0xa/0x15 [ 1379.678712][T15907] ? fault_create_debugfs_attr+0x180/0x180 [ 1379.684523][T15907] ? perf_trace_lock+0xeb/0x4c0 [ 1379.689376][T15907] ? __kasan_check_read+0x11/0x20 [ 1379.695914][T15907] should_fail_alloc_page+0x50/0x60 [ 1379.701112][T15907] __alloc_pages_nodemask+0x1a1/0x900 [ 1379.706480][T15907] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1379.712113][T15907] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1379.717840][T15907] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1379.723484][T15907] ? fault_create_debugfs_attr+0x180/0x180 [ 1379.729297][T15907] cache_grow_begin+0x90/0xd20 [ 1379.734062][T15907] ? kobject_uevent_env+0x387/0x101d [ 1379.739356][T15907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1379.745603][T15907] kmem_cache_alloc_trace+0x6b3/0x790 [ 1379.750999][T15907] kobject_uevent_env+0x387/0x101d [ 1379.756120][T15907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1379.762367][T15907] kobject_uevent+0x20/0x26 [ 1379.766870][T15907] loop_set_fd+0xb52/0x1020 [ 1379.771384][T15907] lo_ioctl+0x1a3/0x1460 [ 1379.775632][T15907] ? loop_set_fd+0x1020/0x1020 [ 1379.780401][T15907] blkdev_ioctl+0xedb/0x1c20 [ 1379.784992][T15907] ? blkpg_ioctl+0xa90/0xa90 [ 1379.789592][T15907] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1379.795423][T15907] block_ioctl+0xee/0x130 [ 1379.799754][T15907] ? blkdev_fallocate+0x410/0x410 [ 1379.804776][T15907] do_vfs_ioctl+0xdb6/0x13e0 [ 1379.809372][T15907] ? ioctl_preallocate+0x210/0x210 [ 1379.814479][T15907] ? __fget+0x384/0x560 [ 1379.818639][T15907] ? ksys_dup3+0x3e0/0x3e0 [ 1379.823068][T15907] ? do_sys_open+0x31d/0x5d0 [ 1379.827659][T15907] ? tomoyo_file_ioctl+0x23/0x30 [ 1379.832597][T15907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.838841][T15907] ? security_file_ioctl+0x8d/0xc0 [ 1379.843952][T15907] ksys_ioctl+0xab/0xd0 [ 1379.848107][T15907] __x64_sys_ioctl+0x73/0xb0 [ 1379.852701][T15907] do_syscall_64+0xfa/0x760 [ 1379.857212][T15907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.863096][T15907] RIP: 0033:0x4596e7 [ 1379.866996][T15907] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1379.886596][T15907] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1379.895002][T15907] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1379.902969][T15907] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1379.910933][T15907] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1379.918900][T15907] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1379.926868][T15907] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1380.096140][ T26] audit: type=1804 audit(1567245615.761:52): pid=15891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir715132310/syzkaller.pTgYbN/180/bus" dev="sda1" ino=16911 res=1 [ 1380.153309][ T26] audit: type=1800 audit(1567245615.811:53): pid=15894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16911 res=0 10:00:21 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x0, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r1 = dup(r0) pause() getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, 0x0) 10:00:21 executing program 0 (fault-call:4 fault-nth:31): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:21 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet(0x2, 0x0, 0x0) getpeername(r0, 0x0, 0x0) [ 1386.073929][T15927] FAULT_INJECTION: forcing a failure. [ 1386.073929][T15927] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.102695][T15927] CPU: 0 PID: 15927 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1386.111844][T15927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.121951][T15927] Call Trace: [ 1386.125276][T15927] dump_stack+0x172/0x1f0 [ 1386.129637][T15927] should_fail.cold+0xa/0x15 [ 1386.134258][T15927] ? fault_create_debugfs_attr+0x180/0x180 [ 1386.140094][T15927] ? ___might_sleep+0x163/0x280 [ 1386.144974][T15927] __should_failslab+0x121/0x190 [ 1386.149932][T15927] should_failslab+0x9/0x14 [ 1386.154447][T15927] __kmalloc+0x2e0/0x770 [ 1386.158726][T15927] ? kobject_get_path+0xc4/0x1b0 [ 1386.163692][T15927] kobject_get_path+0xc4/0x1b0 [ 1386.168483][T15927] kobject_uevent_env+0x3ab/0x101d [ 1386.173624][T15927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1386.179904][T15927] kobject_uevent+0x20/0x26 [ 1386.184427][T15927] loop_set_fd+0xb52/0x1020 [ 1386.188969][T15927] lo_ioctl+0x1a3/0x1460 [ 1386.193240][T15927] ? loop_set_fd+0x1020/0x1020 [ 1386.198025][T15927] blkdev_ioctl+0xedb/0x1c20 [ 1386.202634][T15927] ? blkpg_ioctl+0xa90/0xa90 [ 1386.207245][T15927] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1386.213105][T15927] block_ioctl+0xee/0x130 [ 1386.217442][T15927] ? blkdev_fallocate+0x410/0x410 [ 1386.222483][T15927] do_vfs_ioctl+0xdb6/0x13e0 [ 1386.227104][T15927] ? ioctl_preallocate+0x210/0x210 [ 1386.232228][T15927] ? __fget+0x384/0x560 [ 1386.236416][T15927] ? ksys_dup3+0x3e0/0x3e0 [ 1386.240859][T15927] ? do_sys_open+0x31d/0x5d0 [ 1386.245482][T15927] ? tomoyo_file_ioctl+0x23/0x30 [ 1386.250435][T15927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1386.256688][T15927] ? security_file_ioctl+0x8d/0xc0 [ 1386.261822][T15927] ksys_ioctl+0xab/0xd0 [ 1386.266004][T15927] __x64_sys_ioctl+0x73/0xb0 [ 1386.270621][T15927] do_syscall_64+0xfa/0x760 [ 1386.275414][T15927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1386.281322][T15927] RIP: 0033:0x4596e7 [ 1386.285232][T15927] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1386.304846][T15927] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1386.313276][T15927] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1386.321262][T15927] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1386.329241][T15927] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1386.337220][T15927] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1386.345195][T15927] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:23 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:23 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0xffffffffffffff28) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = semget$private(0x0, 0x0, 0x300) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) semget(0x3, 0x0, 0x0) setns(r0, 0x14000000) tkill(r1, 0x1000000000016) 10:00:23 executing program 0 (fault-call:4 fault-nth:32): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') gettid() setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) write$P9_RSTATFS(r0, 0x0, 0x0) 10:00:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:23 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x600000, 0x0) llistxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000200)=""/220, 0xdc) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a2"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1388.152386][T15945] FAULT_INJECTION: forcing a failure. [ 1388.152386][T15945] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.167949][T15945] CPU: 1 PID: 15945 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1388.177070][T15945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.187120][T15945] Call Trace: [ 1388.190423][T15945] dump_stack+0x172/0x1f0 [ 1388.194757][T15945] should_fail.cold+0xa/0x15 [ 1388.199330][T15945] ? fault_create_debugfs_attr+0x180/0x180 [ 1388.205137][T15945] ? ___might_sleep+0x163/0x280 [ 1388.209983][T15945] __should_failslab+0x121/0x190 [ 1388.214908][T15945] should_failslab+0x9/0x14 [ 1388.219394][T15945] kmem_cache_alloc_node+0x268/0x740 [ 1388.224671][T15945] ? find_held_lock+0x35/0x130 [ 1388.229498][T15945] ? netlink_has_listeners+0x23b/0x3f0 [ 1388.234990][T15945] __alloc_skb+0xd5/0x5e0 [ 1388.239322][T15945] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1388.244436][T15945] ? __kasan_check_read+0x11/0x20 [ 1388.249457][T15945] alloc_uevent_skb+0x83/0x1e2 [ 1388.254203][T15945] kobject_uevent_env+0xaa3/0x101d [ 1388.259319][T15945] kobject_uevent+0x20/0x26 [ 1388.263816][T15945] loop_set_fd+0xb52/0x1020 [ 1388.268316][T15945] lo_ioctl+0x1a3/0x1460 [ 1388.272558][T15945] ? loop_set_fd+0x1020/0x1020 [ 1388.277313][T15945] blkdev_ioctl+0xedb/0x1c20 [ 1388.281883][T15945] ? blkpg_ioctl+0xa90/0xa90 [ 1388.286469][T15945] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1388.292277][T15945] block_ioctl+0xee/0x130 [ 1388.296583][T15945] ? blkdev_fallocate+0x410/0x410 [ 1388.301601][T15945] do_vfs_ioctl+0xdb6/0x13e0 [ 1388.306193][T15945] ? ioctl_preallocate+0x210/0x210 [ 1388.311300][T15945] ? __fget+0x384/0x560 [ 1388.315438][T15945] ? ksys_dup3+0x3e0/0x3e0 [ 1388.319853][T15945] ? do_sys_open+0x31d/0x5d0 [ 1388.324439][T15945] ? tomoyo_file_ioctl+0x23/0x30 [ 1388.329385][T15945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1388.335618][T15945] ? security_file_ioctl+0x8d/0xc0 [ 1388.340723][T15945] ksys_ioctl+0xab/0xd0 [ 1388.344875][T15945] __x64_sys_ioctl+0x73/0xb0 [ 1388.349459][T15945] do_syscall_64+0xfa/0x760 [ 1388.353949][T15945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.359820][T15945] RIP: 0033:0x4596e7 [ 1388.363704][T15945] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1388.383311][T15945] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1388.391718][T15945] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1388.399689][T15945] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1388.407649][T15945] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1388.415619][T15945] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1388.423591][T15945] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:32 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x0, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x3f, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="44000000bdd173db6766998cd1041013575acfb75407c22bf2f4930e7eeb14653ed07c83d1890c7093f7e3c1fb70a4fdf2e389e2159c87dc6b11fde41ae9439ffa25b73b"], &(0x7f0000000080)=0x2) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x7}, 0x8) 10:00:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:32 executing program 0 (fault-call:4 fault-nth:33): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000100)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 10:00:32 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept(r0, &(0x7f0000000400)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000640)=0xffffffffffffffa1) getsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000140)={@initdev, @dev}, &(0x7f0000000180)=0x8) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000340)={0x0, 0x2}) openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x2, 0x3, 0x80, 0x34, 0x0, 0x3, 0x0, 0x3aa}, &(0x7f0000000200)={0x0, 0x3, 0x8, 0x0, 0x5, 0x4eb4, 0x5, 0xffffffff}, &(0x7f0000000240)={0x9, 0xffff, 0x10001, 0x1, 0x2, 0x80, 0x3, 0x5}, &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)={&(0x7f00000002c0)={0x7}, 0x8}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r3, 0x4, 0x70bd2c, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x6ab60e75efa701}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000480)="b7eb952ccfff33467e1b1daa9371788a05d3b25dbad60a43732b34654d30c1aa44a169d12e19fa14fefbdf416f33d1264176cc8c304806a1f4025c2c69914235f120a24ae02966e48221e6e515498d2530ef2b7f8164b0828005473b12b3a3af0e853412ebcd29c8efea547c9326ea76609406885d064d944395361f64b9bbbf39215220fb9d45ba49299a64fc19f1ee9ebed2466e") [ 1397.376031][T15975] Bluetooth: hci0: Frame reassembly failed (-84) [ 1397.383727][T15971] FAULT_INJECTION: forcing a failure. [ 1397.383727][T15971] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.400834][T15971] CPU: 1 PID: 15971 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1397.409934][T15971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.420051][T15971] Call Trace: [ 1397.423484][T15971] dump_stack+0x172/0x1f0 [ 1397.427800][T15971] should_fail.cold+0xa/0x15 [ 1397.432376][T15971] ? fault_create_debugfs_attr+0x180/0x180 [ 1397.438181][T15971] ? ___might_sleep+0x163/0x280 [ 1397.443016][T15971] __should_failslab+0x121/0x190 [ 1397.447935][T15971] should_failslab+0x9/0x14 [ 1397.452415][T15971] kmem_cache_alloc+0x2aa/0x710 [ 1397.457257][T15971] ? __d_lookup+0x42f/0x760 [ 1397.461742][T15971] ? lookup_dcache+0x23/0x140 [ 1397.466409][T15971] ? d_lookup+0xf9/0x260 [ 1397.470650][T15971] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1397.475919][T15971] __d_alloc+0x2e/0x8c0 [ 1397.480076][T15971] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1397.485781][T15971] d_alloc+0x4d/0x280 [ 1397.489748][T15971] __lookup_hash+0xcd/0x190 [ 1397.494232][T15971] filename_create+0x1a7/0x4f0 [ 1397.498979][T15971] ? kern_path_mountpoint+0x40/0x40 [ 1397.504176][T15971] ? strncpy_from_user+0x2b4/0x400 [ 1397.509278][T15971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.515507][T15971] ? getname_flags+0x277/0x5b0 [ 1397.520251][T15971] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1397.525778][T15971] do_mkdirat+0xb5/0x2a0 [ 1397.530007][T15971] ? __ia32_sys_mknod+0xb0/0xb0 [ 1397.534838][T15971] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1397.540274][T15971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.546317][T15971] ? do_syscall_64+0x26/0x760 [ 1397.551073][T15971] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1397.556346][T15971] __x64_sys_mkdir+0x5c/0x80 [ 1397.560919][T15971] do_syscall_64+0xfa/0x760 [ 1397.565412][T15971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.571302][T15971] RIP: 0033:0x458c97 [ 1397.575182][T15971] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1397.594776][T15971] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1397.603172][T15971] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1397.611122][T15971] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1397.619074][T15971] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1397.627022][T15971] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1397.634984][T15971] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:33 executing program 0 (fault-call:4 fault-nth:34): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1397.801867][T15994] FAULT_INJECTION: forcing a failure. [ 1397.801867][T15994] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.819683][T15994] CPU: 0 PID: 15994 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1397.828840][T15994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.828865][T15994] Call Trace: [ 1397.828888][T15994] dump_stack+0x172/0x1f0 [ 1397.828912][T15994] should_fail.cold+0xa/0x15 [ 1397.828929][T15994] ? fault_create_debugfs_attr+0x180/0x180 [ 1397.828952][T15994] ? ___might_sleep+0x163/0x280 [ 1397.828976][T15994] __should_failslab+0x121/0x190 [ 1397.828994][T15994] should_failslab+0x9/0x14 [ 1397.829004][T15994] kmem_cache_alloc+0x2aa/0x710 [ 1397.829015][T15994] ? __d_lookup+0x42f/0x760 [ 1397.829025][T15994] ? lookup_dcache+0x23/0x140 [ 1397.829040][T15994] ? d_lookup+0xf9/0x260 [ 1397.889768][T15994] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1397.895046][T15994] __d_alloc+0x2e/0x8c0 [ 1397.899187][T15994] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1397.904904][T15994] d_alloc+0x4d/0x280 [ 1397.908881][T15994] __lookup_hash+0xcd/0x190 [ 1397.913372][T15994] filename_create+0x1a7/0x4f0 [ 1397.918124][T15994] ? kern_path_mountpoint+0x40/0x40 [ 1397.923304][T15994] ? strncpy_from_user+0x2b4/0x400 [ 1397.923321][T15994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.923331][T15994] ? getname_flags+0x277/0x5b0 [ 1397.923349][T15994] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1397.944995][T15994] do_mkdirat+0xb5/0x2a0 10:00:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1397.949244][T15994] ? __ia32_sys_mknod+0xb0/0xb0 [ 1397.954212][T15994] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1397.959670][T15994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.965820][T15994] ? do_syscall_64+0x26/0x760 [ 1397.970487][T15994] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1397.975760][T15994] __x64_sys_mkdir+0x5c/0x80 [ 1397.980408][T15994] do_syscall_64+0xfa/0x760 [ 1397.984905][T15994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.990778][T15994] RIP: 0033:0x458c97 [ 1397.994720][T15994] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1398.014325][T15994] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1398.014339][T15994] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1398.014346][T15994] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1398.014353][T15994] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1398.014359][T15994] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1398.014372][T15994] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1399.413542][ T5] Bluetooth: hci0: command 0x1003 tx timeout [ 1399.420657][T15977] Bluetooth: hci0: sending frame failed (-49) [ 1401.493427][T15341] Bluetooth: hci0: command 0x1001 tx timeout [ 1401.501023][T15977] Bluetooth: hci0: sending frame failed (-49) [ 1403.572439][T15341] Bluetooth: hci0: command 0x1009 tx timeout 10:00:42 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x0, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000a80)=[{&(0x7f0000000000)="390000001300090069000007a2e407edab0080582900000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 10:00:42 executing program 0 (fault-call:4 fault-nth:35): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1406.551249][T16014] FAULT_INJECTION: forcing a failure. [ 1406.551249][T16014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1406.564566][T16014] CPU: 1 PID: 16014 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1406.573671][T16014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.583725][T16014] Call Trace: [ 1406.587023][T16014] dump_stack+0x172/0x1f0 [ 1406.591371][T16014] should_fail.cold+0xa/0x15 [ 1406.595977][T16014] ? fault_create_debugfs_attr+0x180/0x180 [ 1406.601793][T16014] ? perf_trace_lock+0xeb/0x4c0 [ 1406.606651][T16014] ? __kasan_check_read+0x11/0x20 [ 1406.611692][T16014] should_fail_alloc_page+0x50/0x60 [ 1406.616894][T16014] __alloc_pages_nodemask+0x1a1/0x900 [ 1406.622254][T16014] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1406.627878][T16014] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1406.633596][T16014] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1406.639225][T16014] ? fault_create_debugfs_attr+0x180/0x180 [ 1406.645027][T16014] cache_grow_begin+0x90/0xd20 [ 1406.649783][T16014] ? getname_flags+0xd6/0x5b0 [ 1406.654443][T16014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1406.660663][T16014] kmem_cache_alloc+0x64e/0x710 [ 1406.665508][T16014] ? debug_smp_processor_id+0x3c/0x214 [ 1406.670972][T16014] getname_flags+0xd6/0x5b0 [ 1406.675462][T16014] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1406.680989][T16014] do_mkdirat+0xa0/0x2a0 [ 1406.685227][T16014] ? __ia32_sys_mknod+0xb0/0xb0 [ 1406.690072][T16014] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1406.695514][T16014] ? do_syscall_64+0x26/0x760 [ 1406.700186][T16014] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.706243][T16014] ? do_syscall_64+0x26/0x760 [ 1406.710899][T16014] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1406.716253][T16014] __x64_sys_mkdir+0x5c/0x80 [ 1406.720821][T16014] do_syscall_64+0xfa/0x760 [ 1406.725323][T16014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.731203][T16014] RIP: 0033:0x458c97 [ 1406.735086][T16014] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1406.754680][T16014] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1406.763080][T16014] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1406.771044][T16014] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1406.778994][T16014] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1406.786955][T16014] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1406.794932][T16014] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:43 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x2010, 0xffffffffffffffff, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40085203, &(0x7f0000000080)) 10:00:44 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:44 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0x4) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x7fffffff) 10:00:44 executing program 0 (fault-call:4 fault-nth:36): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:44 executing program 4: bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x85) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000001c0)={0x2, 0x4, 0x40, 'queue0\x00', 0x7}) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x2b) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d76641cb69d952f41bdd2ac8bb8c43", 0x2e}, {&(0x7f0000000140)="aa1d484e24002000a84d4583670e12d9fc56b0953fbd80630600007704a71e023a27b2da9426f40100008000000000a7457e3867", 0x84}], 0x2) 10:00:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1408.745661][T16035] FAULT_INJECTION: forcing a failure. [ 1408.745661][T16035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1408.758895][T16035] CPU: 1 PID: 16035 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1408.768000][T16035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.778058][T16035] Call Trace: [ 1408.781353][T16035] dump_stack+0x172/0x1f0 [ 1408.785696][T16035] should_fail.cold+0xa/0x15 [ 1408.790298][T16035] ? fault_create_debugfs_attr+0x180/0x180 [ 1408.796106][T16035] ? perf_trace_lock+0xeb/0x4c0 [ 1408.800960][T16035] ? __kasan_check_read+0x11/0x20 [ 1408.802309][T16041] sg_write: data in/out 2097152/80 bytes for SCSI command 0x94-- guessing data in; [ 1408.802309][T16041] program syz-executor.4 not setting count and/or reply_len properly [ 1408.805994][T16035] should_fail_alloc_page+0x50/0x60 [ 1408.806010][T16035] __alloc_pages_nodemask+0x1a1/0x900 [ 1408.806023][T16035] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1408.806051][T16035] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1408.845341][T16035] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1408.850983][T16035] ? fault_create_debugfs_attr+0x180/0x180 [ 1408.856797][T16035] cache_grow_begin+0x90/0xd20 [ 1408.861563][T16035] ? getname_flags+0xd6/0x5b0 [ 1408.866248][T16035] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1408.872002][T16041] sg_write: data in/out 2097152/80 bytes for SCSI command 0x94-- guessing data in; [ 1408.872002][T16041] program syz-executor.4 not setting count and/or reply_len properly [ 1408.872490][T16035] kmem_cache_alloc+0x64e/0x710 [ 1408.872509][T16035] ? debug_smp_processor_id+0x3c/0x214 [ 1408.872534][T16035] getname_flags+0xd6/0x5b0 [ 1408.904723][T16035] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1408.910323][T16035] do_mkdirat+0xa0/0x2a0 [ 1408.914581][T16035] ? __ia32_sys_mknod+0xb0/0xb0 [ 1408.919442][T16035] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1408.924896][T16035] ? do_syscall_64+0x26/0x760 [ 1408.929567][T16035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.935630][T16035] ? do_syscall_64+0x26/0x760 [ 1408.940317][T16035] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1408.945614][T16035] __x64_sys_mkdir+0x5c/0x80 [ 1408.950208][T16035] do_syscall_64+0xfa/0x760 [ 1408.954727][T16035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.960621][T16035] RIP: 0033:0x458c97 [ 1408.964524][T16035] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1408.984130][T16035] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 10:00:44 executing program 4: setresuid(0x0, 0xee01, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000240)=0x8, 0x2) socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x10001, 0xd628751605860fea) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f00000000c0)="fbcdea99e274913bcc2e2592129c61e1a4b15bcea368faf5db29b95a491e1a1c8f1ab4a570bce6f4041fbd12f0e5d1be404b561a7d11a8770d7b1be3bc1602ce6f5fef0970", 0x45, 0x4, 0x0, 0x0, r3}, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0xddd, 0x40, 0x6, 0xfffffffffffffc00}, {0x7, 0x7, 0x9}, {0x71, 0xffff, 0x8, 0x6}, {0x100000001, 0x2, 0xee, 0x72}, {0xffffffffffff4cae, 0x1, 0x7, 0x7ff800000000000}, {0xae, 0xb1e2, 0xa9, 0x5}]}, 0x10) [ 1408.992546][T16035] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1409.000511][T16035] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1409.008460][T16035] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1409.016426][T16035] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1409.024379][T16035] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:58 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x0, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:00:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchmod(r0, 0xd) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = inotify_init1(0x800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18, 0xf684d430e8d8c0a5, 0x3, {0x40}}, 0x18) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) dup3(r0, r1, 0x0) 10:00:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:58 executing program 0 (fault-call:4 fault-nth:37): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfffffffffffffe2e, 0x11, 0x0, 0x27) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x20800) ioctl$UI_DEV_CREATE(r1, 0x5501) 10:00:58 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1423.271199][T16069] FAULT_INJECTION: forcing a failure. [ 1423.271199][T16069] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.295197][T16069] CPU: 1 PID: 16069 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1423.304325][T16069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.314378][T16069] Call Trace: [ 1423.317674][T16069] dump_stack+0x172/0x1f0 [ 1423.322014][T16069] should_fail.cold+0xa/0x15 [ 1423.326612][T16069] ? fault_create_debugfs_attr+0x180/0x180 [ 1423.332416][T16069] ? ___might_sleep+0x163/0x280 [ 1423.337249][T16069] __should_failslab+0x121/0x190 [ 1423.342169][T16069] should_failslab+0x9/0x14 [ 1423.346705][T16069] kmem_cache_alloc+0x2aa/0x710 [ 1423.351551][T16069] ? __d_lookup+0x42f/0x760 [ 1423.356030][T16069] ? lookup_dcache+0x23/0x140 [ 1423.360681][T16069] ? d_lookup+0xf9/0x260 [ 1423.364903][T16069] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1423.370175][T16069] __d_alloc+0x2e/0x8c0 [ 1423.374314][T16069] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1423.380014][T16069] d_alloc+0x4d/0x280 [ 1423.383977][T16069] __lookup_hash+0xcd/0x190 [ 1423.388464][T16069] filename_create+0x1a7/0x4f0 [ 1423.393214][T16069] ? kern_path_mountpoint+0x40/0x40 [ 1423.398398][T16069] ? strncpy_from_user+0x2b4/0x400 [ 1423.403486][T16069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1423.409701][T16069] ? getname_flags+0x277/0x5b0 [ 1423.414513][T16069] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1423.420057][T16069] do_mkdirat+0xb5/0x2a0 [ 1423.424396][T16069] ? __ia32_sys_mknod+0xb0/0xb0 [ 1423.429234][T16069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1423.434687][T16069] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.440779][T16069] ? do_syscall_64+0x26/0x760 [ 1423.445444][T16069] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1423.450707][T16069] __x64_sys_mkdir+0x5c/0x80 [ 1423.455277][T16069] do_syscall_64+0xfa/0x760 [ 1423.459764][T16069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.465631][T16069] RIP: 0033:0x458c97 [ 1423.469507][T16069] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1423.490138][T16069] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1423.498536][T16069] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1423.506484][T16069] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1423.514441][T16069] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 10:00:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:00:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x0, 0x990c2fff3db09152}, &(0x7f0000000200)=0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$rose(r1, 0x104, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1423.522427][T16069] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1423.530382][T16069] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:00:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101802, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(0x0, &(0x7f00000000c0)='./file0\x00') shmctl$SHM_LOCK(0x0, 0xb) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x8000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001300)={0x80000000, 0x7, 0x20a, 0x3, 0x0, 0x6, 0xbab, 0x1, 0x0}, &(0x7f0000001340)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001380)={0x2, 0x8000, 0xf4e2, 0x80000001, 0x0}, &(0x7f00000013c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001400)={r1, 0x3e3e9b5f8000000, 0x8000, 0x20, 0x100000001, 0x400000, 0x400, 0x7fffffff, {r2, @in={{0x2, 0x4e20, @loopback}}, 0x5, 0x8, 0x40, 0x93e00000000, 0x100000001}}, &(0x7f00000014c0)=0xb0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000200)) r3 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x0, @dev}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f00000012c0)={0x3f, 0x5207c7e6847a8653, "4316f5f688d5d928b4b193969358c309b6d2e61b50c34a46", {0x1, 0x220a}, 0x227}) uname(&(0x7f00000011c0)=""/142) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @remote, 0x1ff}}}, 0x178) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000001280)=r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001100)={r3, &(0x7f0000000040), &(0x7f0000000100)=""/4096}, 0x18) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000001140)='trusted.overlay.nlink\x00', &(0x7f0000001180)={'U-', 0x1ff}, 0x28, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 10:00:59 executing program 0 (fault-call:4 fault-nth:38): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:00:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1423.690063][T16091] FAULT_INJECTION: forcing a failure. [ 1423.690063][T16091] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.704041][T16091] CPU: 0 PID: 16091 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1423.713146][T16091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.723183][T16091] Call Trace: [ 1423.726459][T16091] dump_stack+0x172/0x1f0 [ 1423.730778][T16091] should_fail.cold+0xa/0x15 [ 1423.735351][T16091] ? fault_create_debugfs_attr+0x180/0x180 [ 1423.741143][T16091] ? ___might_sleep+0x163/0x280 [ 1423.746004][T16091] __should_failslab+0x121/0x190 [ 1423.750938][T16091] should_failslab+0x9/0x14 [ 1423.755421][T16091] __kmalloc+0x2e0/0x770 [ 1423.759657][T16091] ? mark_held_locks+0xf0/0xf0 [ 1423.764412][T16091] ? stack_trace_save+0xac/0xe0 [ 1423.769275][T16091] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1423.774981][T16091] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1423.780508][T16091] ? tomoyo_path_number_perm+0x193/0x520 [ 1423.786135][T16091] tomoyo_path_number_perm+0x1dd/0x520 [ 1423.791589][T16091] ? tomoyo_path_number_perm+0x193/0x520 [ 1423.797210][T16091] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1423.803004][T16091] ? find_held_lock+0x35/0x130 [ 1423.807784][T16091] ? putname+0xef/0x130 [ 1423.811923][T16091] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1423.817453][T16091] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1423.823415][T16091] ? trace_hardirqs_on+0x67/0x240 [ 1423.828445][T16091] ? kmem_cache_free+0x26b/0x320 [ 1423.833387][T16091] tomoyo_path_mkdir+0xaa/0xf0 [ 1423.838136][T16091] ? tomoyo_file_ioctl+0x30/0x30 [ 1423.843054][T16091] ? kern_path_mountpoint+0x40/0x40 [ 1423.848252][T16091] ? strncpy_from_user+0x2b4/0x400 [ 1423.853358][T16091] security_path_mkdir+0x113/0x170 [ 1423.858457][T16091] do_mkdirat+0x160/0x2a0 [ 1423.862782][T16091] ? __ia32_sys_mknod+0xb0/0xb0 [ 1423.867617][T16091] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1423.873063][T16091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.879108][T16091] ? do_syscall_64+0x26/0x760 [ 1423.883769][T16091] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1423.889039][T16091] __x64_sys_mkdir+0x5c/0x80 [ 1423.893629][T16091] do_syscall_64+0xfa/0x760 [ 1423.898132][T16091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.904008][T16091] RIP: 0033:0x458c97 [ 1423.907896][T16091] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1423.927493][T16091] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 10:00:59 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x201, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000200)={0x9e, &(0x7f0000000140)=""/158}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="000000800700000025000000000000000900000000000002"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 1423.935884][T16091] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1423.943845][T16091] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1423.951904][T16091] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1423.959856][T16091] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1423.967810][T16091] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1423.993957][T16091] ERROR: Out of memory at tomoyo_realpath_from_path. 10:01:08 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x0, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:08 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x15400000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8010}, 0x4001) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x1d, &(0x7f00000007c0), 0x4) 10:01:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @mcast1, 0x80000001, 0x6, 0xffff, 0x82fd78ca0a654ceb, 0x3, 0x10000, r3}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="1f0000000000000000000040050400a90000e7fc4b83bbb6a23b4b6942b787100100000001a400002560b700fff0ffff0403ffffffff00000a00000006"]) ioctl$KVM_SET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x3, 0x2, [{0x38e}]}) 10:01:08 executing program 0 (fault-call:4 fault-nth:39): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:01:08 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1432.469550][T16117] FAULT_INJECTION: forcing a failure. [ 1432.469550][T16117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1432.482790][T16117] CPU: 1 PID: 16117 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1432.491902][T16117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.501957][T16117] Call Trace: [ 1432.505253][T16117] dump_stack+0x172/0x1f0 [ 1432.509578][T16117] should_fail.cold+0xa/0x15 [ 1432.514159][T16117] ? is_bpf_text_address+0xac/0x170 [ 1432.519343][T16117] ? fault_create_debugfs_attr+0x180/0x180 [ 1432.525826][T16117] ? is_bpf_text_address+0xac/0x170 [ 1432.531014][T16117] should_fail_alloc_page+0x50/0x60 [ 1432.536193][T16117] __alloc_pages_nodemask+0x1a1/0x900 [ 1432.541550][T16117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.547775][T16117] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1432.553484][T16117] ? __kasan_check_read+0x11/0x20 [ 1432.558506][T16117] ? fault_create_debugfs_attr+0x180/0x180 [ 1432.564381][T16117] cache_grow_begin+0x90/0xd20 [ 1432.569132][T16117] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1432.574834][T16117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1432.581056][T16117] __kmalloc+0x6b2/0x770 [ 1432.585280][T16117] ? mark_held_locks+0xf0/0xf0 [ 1432.590025][T16117] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1432.595725][T16117] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1432.601250][T16117] ? tomoyo_path_number_perm+0x193/0x520 [ 1432.606869][T16117] tomoyo_path_number_perm+0x1dd/0x520 [ 1432.612307][T16117] ? tomoyo_path_number_perm+0x193/0x520 [ 1432.617925][T16117] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1432.623709][T16117] ? find_held_lock+0x35/0x130 [ 1432.628477][T16117] ? putname+0xef/0x130 [ 1432.632617][T16117] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1432.638145][T16117] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1432.644103][T16117] ? trace_hardirqs_on+0x67/0x240 [ 1432.649115][T16117] ? kmem_cache_free+0x26b/0x320 [ 1432.654035][T16117] tomoyo_path_mkdir+0xaa/0xf0 [ 1432.658777][T16117] ? tomoyo_file_ioctl+0x30/0x30 [ 1432.663696][T16117] ? kern_path_mountpoint+0x40/0x40 [ 1432.668875][T16117] ? strncpy_from_user+0x2b4/0x400 [ 1432.673973][T16117] security_path_mkdir+0x113/0x170 [ 1432.679071][T16117] do_mkdirat+0x160/0x2a0 [ 1432.683383][T16117] ? __ia32_sys_mknod+0xb0/0xb0 [ 1432.688212][T16117] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1432.694148][T16117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.700192][T16117] ? do_syscall_64+0x26/0x760 [ 1432.704853][T16117] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1432.710123][T16117] __x64_sys_mkdir+0x5c/0x80 [ 1432.714693][T16117] do_syscall_64+0xfa/0x760 [ 1432.719288][T16117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.725157][T16117] RIP: 0033:0x458c97 [ 1432.729037][T16117] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.748621][T16117] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1432.757009][T16117] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 10:01:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:08 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc4c85512, &(0x7f0000000000)=ANY=[@ANYBLOB="4e0002d43bc1fb00"]) fremovexattr(r0, &(0x7f0000000080)=@random={'btrfs.', '/dev/snd/controlC#\x00'}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400, 0x0) [ 1432.764963][T16117] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1432.772916][T16117] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1432.780864][T16117] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1432.788838][T16117] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:08 executing program 0 (fault-call:4 fault-nth:40): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:01:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@unhide='unhide'}, {@map_normal='map=normal'}, {@iocharset={'iocharset', 0x3d, 'cp1250'}}]}) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x101, 0x200a00) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x7, 0x4) write$P9_ROPEN(r0, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x1, 0x0, 0x1}, 0xa}}, 0x18) 10:01:08 executing program 4: rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x804, &(0x7f0000000080)=0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r3, 0x101) io_submit(r2, 0x7, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) [ 1433.097068][T16139] FAULT_INJECTION: forcing a failure. [ 1433.097068][T16139] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.173236][T16139] CPU: 1 PID: 16139 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1433.182388][T16139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.192451][T16139] Call Trace: [ 1433.195755][T16139] dump_stack+0x172/0x1f0 [ 1433.200106][T16139] should_fail.cold+0xa/0x15 [ 1433.204711][T16139] ? fault_create_debugfs_attr+0x180/0x180 [ 1433.210532][T16139] ? ___might_sleep+0x163/0x280 [ 1433.215399][T16139] __should_failslab+0x121/0x190 [ 1433.220344][T16139] ? ratelimit_state_init+0xb0/0xb0 [ 1433.225546][T16139] should_failslab+0x9/0x14 [ 1433.230053][T16139] kmem_cache_alloc+0x2aa/0x710 [ 1433.234922][T16139] ? ratelimit_state_init+0xb0/0xb0 [ 1433.240121][T16139] ext4_alloc_inode+0x1f/0x640 [ 1433.244896][T16139] ? ratelimit_state_init+0xb0/0xb0 [ 1433.250108][T16139] alloc_inode+0x68/0x1e0 [ 1433.254444][T16139] new_inode_pseudo+0x19/0xf0 [ 1433.255803][T16142] ISOFS: Unable to identify CD-ROM format. [ 1433.259120][T16139] new_inode+0x1f/0x40 [ 1433.259138][T16139] __ext4_new_inode+0x3d5/0x4e50 [ 1433.259171][T16139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.280386][T16139] ? __dquot_initialize+0x525/0xd80 [ 1433.285573][T16139] ? ext4_free_inode+0x1490/0x1490 [ 1433.290683][T16139] ? dqget+0x10d0/0x10d0 [ 1433.294923][T16139] ? putname+0xef/0x130 [ 1433.299059][T16139] ext4_mkdir+0x3df/0xe20 [ 1433.303395][T16139] ? ext4_init_dot_dotdot+0x520/0x520 [ 1433.308755][T16139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.314975][T16139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.321194][T16139] ? security_inode_permission+0xcb/0x100 [ 1433.326909][T16139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.333155][T16139] ? security_inode_mkdir+0xe4/0x120 [ 1433.338431][T16139] vfs_mkdir+0x42e/0x670 [ 1433.342668][T16139] do_mkdirat+0x234/0x2a0 [ 1433.346998][T16139] ? __ia32_sys_mknod+0xb0/0xb0 [ 1433.351839][T16139] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1433.357280][T16139] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.363331][T16139] ? do_syscall_64+0x26/0x760 [ 1433.368004][T16139] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1433.373305][T16139] __x64_sys_mkdir+0x5c/0x80 [ 1433.377877][T16139] do_syscall_64+0xfa/0x760 [ 1433.382378][T16139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.388266][T16139] RIP: 0033:0x458c97 [ 1433.392150][T16139] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1433.411731][T16139] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1433.420120][T16139] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1433.428078][T16139] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1433.436039][T16139] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1433.443997][T16139] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1433.451956][T16139] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:17 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x0, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:17 executing program 4: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x1) rt_tgsigqueueinfo(r0, r0, 0xf, &(0x7f0000000000)={0x200000, 0x0, 0xbe2}) tkill(r0, 0x12) 10:01:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = getpgrp(0xffffffffffffffff) ptrace$poke(0x5, r2, &(0x7f0000000280), 0x100) sched_rr_get_interval(r2, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2208a0}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf25020000000c00060004000200040002007c0001000800030005000000100001007564703a73797a31000000002c00020008000100150000000800010017000000080001000500000008000200ffffffff08000200f7a9000010fd00006574683a64756d6d7930180008000300feffffff140002000800020009000000080003000600000008000300ae04000014000600080001000500001c7e0001000000000004000700"], 0xb4}, 0x1, 0x0, 0x0, 0x20000810}, 0x40000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000300)={0x1, 0xf4, 0x6, 0x7fff, 0x80, 0x32c, 0x5, 0x2, 0x8000, 0xfffffffffffffbff, 0x2}, 0xb) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000001020104870000000000000037cfe757f5821a7b05000100e0000002"], 0x20}}, 0x0) 10:01:17 executing program 0 (fault-call:4 fault-nth:41): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:01:17 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1441.677376][T16169] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1441.703328][T16174] FAULT_INJECTION: forcing a failure. [ 1441.703328][T16174] name failslab, interval 1, probability 0, space 0, times 0 10:01:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000000000000025fede660a6c1c6ec3020d15b97b31f134402e143878fa453618cfb6dccc8d1618bc9915642cf6741c5b747ed813b2209640b52287f8"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xfffffffffffffe25) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000003c0)={0x0, 0x3a1, &(0x7f0000000540)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01040000000000f0ff0004000000"], 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x1, 0x0, 0x774}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000340)=@assoc_value={0x0, 0x1}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r2, 0x10000, 0xf3b, 0x1000, 0x8, 0x8, 0x6, 0x0, {r3, @in={{0x2, 0x4e22, @remote}}, 0x7ff, 0x5b049086, 0x8, 0x37a7, 0x4}}, &(0x7f00000004c0)=0xb0) fcntl$setflags(r1, 0x2, 0x3) [ 1441.736919][T16174] CPU: 0 PID: 16174 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1441.746071][T16174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.756137][T16174] Call Trace: [ 1441.759451][T16174] dump_stack+0x172/0x1f0 [ 1441.763810][T16174] should_fail.cold+0xa/0x15 [ 1441.768425][T16174] ? fault_create_debugfs_attr+0x180/0x180 [ 1441.774253][T16174] ? ___might_sleep+0x163/0x280 [ 1441.779135][T16174] __should_failslab+0x121/0x190 [ 1441.784100][T16174] should_failslab+0x9/0x14 [ 1441.788623][T16174] __kmalloc+0x2e0/0x770 [ 1441.792925][T16174] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1441.799097][T16174] ? ext4_find_extent+0x76e/0x9d0 [ 1441.804150][T16174] ext4_find_extent+0x76e/0x9d0 [ 1441.809023][T16174] ? ext4_map_blocks+0xda8/0x17e0 [ 1441.814071][T16174] ext4_ext_map_blocks+0x1dc/0x5040 [ 1441.819289][T16174] ? mark_held_locks+0xf0/0xf0 [ 1441.824077][T16174] ? ext4_ext_release+0x10/0x10 [ 1441.828929][T16174] ? lock_acquire+0x190/0x410 [ 1441.833603][T16174] ? ext4_map_blocks+0x4b3/0x17e0 [ 1441.838629][T16174] ? __kasan_check_write+0x14/0x20 [ 1441.843730][T16174] ? down_write+0xdf/0x150 [ 1441.848134][T16174] ? down_write_killable_nested+0x180/0x180 [ 1441.854014][T16174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1441.860241][T16174] ? ext4_es_lookup_extent+0x408/0xce0 [ 1441.865697][T16174] ext4_map_blocks+0x52b/0x17e0 [ 1441.870546][T16174] ? ext4_issue_zeroout+0x190/0x190 [ 1441.875748][T16174] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1441.881713][T16174] ? __kasan_check_write+0x14/0x20 [ 1441.886818][T16174] ext4_getblk+0xc4/0x570 [ 1441.891143][T16174] ? ext4_iomap_begin+0x1000/0x1000 [ 1441.896345][T16174] ext4_bread+0x8f/0x390 [ 1441.900576][T16174] ? ext4_getblk+0x570/0x570 [ 1441.905169][T16174] ext4_append+0x155/0x370 [ 1441.909579][T16174] ext4_mkdir+0x632/0xe20 [ 1441.913938][T16174] ? ext4_init_dot_dotdot+0x520/0x520 [ 1441.919300][T16174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.925534][T16174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.931761][T16174] ? security_inode_permission+0xcb/0x100 [ 1441.937475][T16174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.943707][T16174] ? security_inode_mkdir+0xe4/0x120 [ 1441.948989][T16174] vfs_mkdir+0x42e/0x670 [ 1441.953241][T16174] do_mkdirat+0x234/0x2a0 [ 1441.957564][T16174] ? __ia32_sys_mknod+0xb0/0xb0 [ 1441.962407][T16174] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1441.967855][T16174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.973927][T16174] ? do_syscall_64+0x26/0x760 [ 1441.978607][T16174] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1441.983885][T16174] __x64_sys_mkdir+0x5c/0x80 [ 1441.988472][T16174] do_syscall_64+0xfa/0x760 [ 1441.992975][T16174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.999113][T16174] RIP: 0033:0x458c97 [ 1442.003014][T16174] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.022599][T16174] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 10:01:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000001c0)={0x28}, 0x28) r3 = accept4(r0, &(0x7f0000000240)=@l2, &(0x7f0000000300)=0x80, 0x800) connect$pptp(r3, &(0x7f0000000340)={0x18, 0x2, {0x0, @local}}, 0x1e) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200), 0x1) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000000c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x10, 0x0, 0x0) [ 1442.031012][T16174] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1442.038993][T16174] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1442.046956][T16174] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1442.054915][T16174] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1442.062883][T16174] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:17 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x80, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x800) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) clone(0x0, &(0x7f0000000580)="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", 0x0, 0x0, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000000)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 10:01:17 executing program 0 (fault-call:4 fault-nth:42): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1442.412169][T16205] FAULT_INJECTION: forcing a failure. [ 1442.412169][T16205] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.425442][T16205] CPU: 0 PID: 16205 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1442.434591][T16205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.444640][T16205] Call Trace: [ 1442.448008][T16205] dump_stack+0x172/0x1f0 [ 1442.452374][T16205] should_fail.cold+0xa/0x15 [ 1442.456996][T16205] ? fault_create_debugfs_attr+0x180/0x180 [ 1442.462819][T16205] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1442.468641][T16205] __should_failslab+0x121/0x190 [ 1442.473683][T16205] should_failslab+0x9/0x14 [ 1442.478191][T16205] kmem_cache_alloc+0x47/0x710 [ 1442.482961][T16205] ? __kasan_check_write+0x14/0x20 [ 1442.488083][T16205] ? do_raw_write_lock+0x124/0x290 [ 1442.493222][T16205] __es_insert_extent+0x2cc/0xf20 [ 1442.498281][T16205] ext4_es_insert_extent+0x2d2/0xa70 [ 1442.503594][T16205] ? ext4_es_scan_clu+0xe0/0xe0 [ 1442.508463][T16205] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1442.514455][T16205] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1442.520698][T16205] ? ext4_es_find_extent_range+0x131/0x660 [ 1442.526514][T16205] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1442.532043][T16205] ? ext4_rereserve_cluster+0x240/0x240 [ 1442.537572][T16205] ? ext4_find_extent+0x76e/0x9d0 [ 1442.542589][T16205] ? ext4_find_extent+0x6a6/0x9d0 [ 1442.547598][T16205] ? __lockdep_free_key_range+0x120/0x120 [ 1442.553308][T16205] ext4_ext_map_blocks+0x20c4/0x5040 [ 1442.558588][T16205] ? ext4_ext_release+0x10/0x10 [ 1442.563441][T16205] ? __kasan_check_write+0x14/0x20 [ 1442.568539][T16205] ? down_read+0x109/0x430 [ 1442.572944][T16205] ? down_read_killable+0x490/0x490 [ 1442.578126][T16205] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1442.584348][T16205] ? ext4_es_lookup_extent+0x408/0xce0 [ 1442.589797][T16205] ext4_map_blocks+0xdc7/0x17e0 [ 1442.594652][T16205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.600898][T16205] ? ext4_issue_zeroout+0x190/0x190 [ 1442.606091][T16205] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1442.612056][T16205] ? __kasan_check_write+0x14/0x20 [ 1442.617174][T16205] ext4_getblk+0xc4/0x570 [ 1442.621491][T16205] ? ext4_iomap_begin+0x1000/0x1000 [ 1442.626686][T16205] ext4_bread+0x8f/0x390 [ 1442.630954][T16205] ? ext4_getblk+0x570/0x570 [ 1442.635539][T16205] ext4_append+0x155/0x370 [ 1442.639944][T16205] ext4_mkdir+0x632/0xe20 [ 1442.644270][T16205] ? ext4_init_dot_dotdot+0x520/0x520 [ 1442.649636][T16205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.655870][T16205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.662113][T16205] ? security_inode_permission+0xcb/0x100 [ 1442.667823][T16205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.674065][T16205] ? security_inode_mkdir+0xe4/0x120 [ 1442.679339][T16205] vfs_mkdir+0x42e/0x670 [ 1442.683588][T16205] do_mkdirat+0x234/0x2a0 [ 1442.687916][T16205] ? __ia32_sys_mknod+0xb0/0xb0 [ 1442.692760][T16205] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1442.698217][T16205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.704264][T16205] ? do_syscall_64+0x26/0x760 [ 1442.708926][T16205] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1442.714195][T16205] __x64_sys_mkdir+0x5c/0x80 [ 1442.718769][T16205] do_syscall_64+0xfa/0x760 [ 1442.723260][T16205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.729132][T16205] RIP: 0033:0x458c97 [ 1442.733023][T16205] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.752623][T16205] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1442.761012][T16205] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1442.768977][T16205] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1442.776953][T16205] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1442.784918][T16205] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1442.792872][T16205] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:25 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x0, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_INPUT(r0, 0x40045644, &(0x7f0000000140)=0x2) fremovexattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7453cfa78d4dc42eaa1dbffb023773797374656d2e77"]) 10:01:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat(0xffffffffffffff9c, &(0x7f0000001280)='./file0\x00', 0x4000, 0x10) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000002840)={{&(0x7f0000003000/0x3000)=nil, 0x3000}, 0x1}) sendmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4df20e891282817e9d279b2e68fcd95b068f0b05b24378edccb7959f1aaa70513698e6cd28cc6e4170d92af7d49052e310ffeb484edb78c599c485158893ae"}, 0x80, 0x0}}], 0x1, 0x0) sigaltstack(&(0x7f0000000000/0x10000)=nil, 0x0) getpeername$packet(r0, &(0x7f0000002800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002a00)=0x12) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003100)={'rose0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003140)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000003240)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000032c0)=0x14) sendmmsg$inet(r0, &(0x7f0000003300)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="67b6a903f4d8599eb01d514a874882d77f8a47d7b3aa5c31f31dfc236990004fd2e40f72b6243076bad200a8566107001530c75990eaa3933ca84f7b61e4dd3207166a14fd5ebc1f96dcaf053fa433193d88ee4211ec35f5d62c2a815d72e4212f7d949f4ac9ee700087abb029528cb868f7c4610f97a228705bd10c886b1567c171f6e5460948b6e371114d2f5a381b39a9d2dca378ac6e7e5841f82b9350209ce38c48b9702e4a3a61a180242be6eb03159ba5f9a7a42e2fee6c5b6b4f584336421a6f1cad99b9e9a0bb43bdefca5dd6c6c54326fb6695ba99510d10d56555001f615f116642a4aaa438d48fd4a4aace86e04f379e6b", 0xf7}], 0x2, &(0x7f0000001280)}}, {{&(0x7f00000012c0)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000002780)=[{&(0x7f0000001300)="f08478324df71e916bde7f446e29da8c6f43771d1237a8b2afe2a80c760b3560ee7b9e7e5a07cad6af7ca39ec4d45f9b72f775e731fab964d2ea34bb820763ac45a7601643f41c8a699aa1e66a7cb4044a02de9ee25484a27e944d0e839695aa6b16a3a1b556c691a4ab5604f11217781a00eb9959c68b80412ca7bc1db39f533190eb1f667fa28b62f768eb47aef8c1e657435482415248f4abffefd224cff228220e6cb0d76930252306962ab3cc98d77a92b6fe05eebb8e97312c6b2086814d778658234b929d5c6ec83ab2e9916634468232", 0xd4}, {&(0x7f0000001400)="77b25c93da60744b5095b9537c98ccb353d5d493c9f02a04f27fc012c323826a60381973469cf90a7e41facb76686b1321632d481dc47a039f6f9b47de98bc7f55ec7c2e25dd5d4cd20ac23cfc506a3be251416e63c7d326dc5a61b2eb00aa9b6b669e06326dca8a0411153276f352012d52418e59298cc836edac10577ef99d1f7e42f3409687ceff8b9284b51e6d9c5c5529f17e01a092b913fb16f2749a663948c8dccdbec413c0ce7c07ebae8a8de5102bcf3af9c5021ab4156d1e277ceab688c1b48781245efe018b8b5d910a309559e0e1f5c5fe4f51509b062f9c2e6b097bee117697b15e7dc129074a1ef6ca", 0xf0}, {&(0x7f0000001500)="395a9dc6f29309b88cee19944277e466b67e1e23fade968e7e9e6b1dd3cd1a2b080259b8b6", 0x25}, {&(0x7f0000001540)="0a73197b58fc0c4502dd0351cc8517aba7fec6391d105adfbea1768a6566e991530eacab85823e11c602066436465d5e66a4b55f81c37be7e2c4e076ae5ae3df2791fc6fcb9bf3b784130e6b0cfa6c2f055cb9868aeba305093607750f48fcbbf0fb307eab26feb591d44bdf60b8bb65df5d4e9c8b09fdfe86626971143d4202b097edc71f4b3ffe35678a37018135b17971fa3e7015b6ec66a1a11e5f85b8446339e668ef60cf45e752425d7248c1152cb112430754512aa71e043628a801df2a6eb116acaf2aa6ee648c5ba8ba67f43dbc8663c00fb4d2f30389af29797dadc36011aa760c7c72e2560d3c1a2324f5d7f26dbc20a46f4d51fe2d16e5e136dae301e0be65c7781a1ada2729abdf658995bb4b82ac7d1f12dc2d90d0e9a300aa61a604b5f5aca78b0c29c2fc0bb2dd6fea765a3f49e1f0064b78eb98cb6b8de091daa5a5d6331f0fc243392bc74413375cbf5eb0c2a1708681753e125e8bba7ff228df24e6c204164ba62f12f35143c7325967439f0f5446d3554e4e7ecf5402447719cef177862b2363bfb5431f007ffe000129a9708dae62fc3bb0145be2e79d7a1b96aad6b4bc1ed36c2c22719beaba578be79641a15e9e11de0a945ff4d26caaabb0628696446a3da6d235b33b859549db4e7302d81b25f0051e14bbb57ee6b156ed9c08d7909fb2c79d70f8f5859972eb9e8f87384baddb1b1057cf399113ff6f5873a96524d5d3228c15e76dc137750b1054bea8590fe0d8767afc7b6cb931e9b68b276c308974deef4dabcd07f5809ccf05c0d1e0e5a9f0b490156b6a5e040b9db72d48a785699ce67662f90c7efdf77872f05f27121cfcef6f426c1eab763bb7accee6736384c60b977536627eb862fd3440a2c2b8c1309479dde296d6df04ecc5de201a48daba8595dc2ebaa7f9d69b916d5f69ef04da6e1027fe2711fb70cdc49d2812c2716847ab818be8445700a5814ddcbef226487b741e2c8ce6ead5360e94f73232eaf03ec34fc5d330bb4736ba60841ca6d4aeba1078b5ec1c8311fa99b2010e83af2806a04a6d2fefe1f0c60252f43e3141d02723283c59be7fdadafe5fcc209ef0398e5819e46643254276acc4d30d42d90a4a3416c69830e98cb8bf7e6597be9b3b8031e2f1b8293f94aac640f9603312230768cb589168062a13db8133b337f2e60bd8b40a435ccbc02b41267a99a5b38082c8ad3ddd0d5ebc5c40eb0b79013945a8cfd5cc02d9f6f8e734cbe1c3a0f455b0af98209808836e57a9dcccaeec7bbe3c47564dcc0d311e4eceb6e46c93347286f023bcc0944d9faccfb07c21ac2830a1b2235e5be76fab336e3423a9870083c6d266007d10237ce7688564276422383cccb8e65fe54d2e754562daca8881396f0e17520a4a4a8a38ad408ca880668af2da10f7b4ec1dacbb6b2761640bbe603c6283310aaa0a779a9db70e13119d6df298be13f7b04a66701c9fbd6b317cfbcdee4dec5010eed6a4fd42093e4be9ab3ffe709c5ce20b37ffbb989a8a87c3ba503ce760d86a7f2c31b29dd09912fbb093005e51f20353a4ba9b14cde18f53023eda11461d42cb2433d4a74b4f6cc83f9669366f7453196f101be8441b5adab0bfa44a428633c3ad840ea1fc6a377ee3a35b7c9f1518a45273187bbcb158dd2f4f51b2c1abd118ced57b165e6ad6301be9e8ea2f3bbd8bc6129d2ed88f3da8189fe41f420ad12226570255a8872e4d0b1b3c09c87f367220b0280a481ce994b6b119ae4fbc3eea39f353667c23a44206cf4b3dd2fa0421e51ba60da97cad5bd59a1ad93808b05deb7058933923d573050cbdee6b7562aab0f8e7797501395a18e211c54af9e18680740413d2ef5621bbbf1db3201d0c57249005825fb012f9a4bbb8b45cb8dff306d1b1bca61d3aafca5b9aaa174fb95a462f83a7db01dbe322d3bc3db70f71de2da21a67346bd1c9e15b58be7789438442d0f8a8b48d29761274ad30ce9f5edfd12f8f818003b6965be1a295036bc5c86d73c40801307d5a864c6eb40e071b42b72ef44b2ff4a43ee908035bf61d77914410fcf6b0031d56b2e39626c83d9a79e806fda8a8dac88350e775b0211c00ca095b23e318487b83febab35ca1d002a5caca8cf4b93597a7d0fe08667b5cee5c3808aa38d20f5716c8f7f208fe6648a4cdb4cc232f56a5ddfc88be79341f785b9059a57b3dc023593ad872be6c7c99de92187e4ba1d9237296e49af724304610fcc6d6dfdd5a708f90cad770be6b679690d2d1912be0169cec7eccaf6949d68cae71f81320b1dc9bec2ddeccb5c15a30f4e4e692baed9f48d6bb91cf346859d74f4a42d7d365e7cd96cfa8440f88781a293f1301e60077d4b611e4498db0aa95de8cc7290b08c671e698c8026d6deaf2f9201195a2142b2dee87aabfa6125ac0fd5242c22dbe47a77dc3194a7938e99bc518b847461ccb5ced1c19059a1b56098a04ef42c302b47943f532b73655dfad4f18fd1f4d4fc75f2759375372ba755418e24549a61213c7f722b0c9124c75bd32b41e08a2a8407200b1e12243bbf20eb66be3a5b26cfebd7de0a8008306429fb392ae4e036c0e2f7576e23b3da3efba8eba23c7688a6dda24af93e9b3631b80034f2d5302819d775edb07a96bc28d4db236df7b0dd83bec36065704b819a6c2fd06053136f525e2a7a91b4a42176b0a28dc5e5c94f447b72ae781dcc816eeda4c545d14c72986a28cb483c9611be09dab2ec173b2f8f91b906ec541026da3b16790496e4746b891cc8142df5227c731227dc7ed977df84e00aac461cf17f0886217ba762dff872902d58291d4bcbc2b6cbec16dd56f93ded09a4de8a4f9fa283819856f457a98105ae58b3523fc1e4c201421ff4fcbaa4eab950e465a8dfd2c820d2e743d4b51fccffa7da6e789deb9cd2faace0cc0fff35596d7a95fdd35db14b4138b7f7af04fa5f391ca1c83d04cfbd675c7967ff00cea29d3840c3f48ba841bafddfcff323ed82d160f46a2bf5488ae88ff635a98666e50e30510b3665a027e590ed1b2b53874f5808c243074361ba38243f2594f5fbb1a6787c7dbf5fe23a627ff35b866dd9cc5dea50d0e26eaa122333b6f38b9166c63254235c9b2706f7cbfec53c895e6995c1e2e8ad9f952235fa3692023e2a4beab4ef7a0ad57bc15091082da36c5ce099279f9c929ef40d2a5ef8edc15cc1ef8ab19911a4cd7e66a7fc0a76d4d434aefb5e4da984f8ed8b4004291770cec7fa823e8f9a30def186d31a9c4147bf898d55555b558b54dfa7fc5cf5b3385f2cec0e945f6dfd024a4d28577f0ebd81cec0f6f9c72c5b6e7c0df04f6d78e34f43345d8aac81ffc312065f8f5c3165ede1766217c463e8193609cca6556ef10c7296089f7285cbb5ff208a7b62ba8a3cc9818507327c102c11dc6e5230b7bd07033191cf5039266d027c8caf186b00089c4d69d56a42ab79684b8476d8f8aa3928b8d30af9208298f2a3ace7636bc0cb017f2740c9004c21664a74ff7cdc48eb5ccedf161d647319bf6592891d95f45058a4edaf6900f0cb87f987365a57621eef0b68a6f410fb8033c9430bab6b862b858d37c747badfae982152cf3729f6668d4b8b5f6e7483c00f668fe6e89d7309db801eb033b206a3e1296341e40410cc9f9429ab725cd493db0113a3cfd5abbaef5a3427a19b39cfb916293f24d5f7fb6ed875d57416bbfde1fd964743c5226444e18d00dcdc43e49523486f8458ec0ac8aad7467d6d33bad166dcb3fa3a1400d9624de30deb23b742d22b376c3eba796222ff0fad205f7ded6d1d970a3866b1f1526aae6128763b2cbfe3e928705a10d73edaa2162e472711ba068246a8fbce26bb8a440f534c87d18d9c2cdd99055721e68d67a1c436b1d18e3005ec97f7ac729c16d7d8507bc67b799db6c8433afa4c0a4b561be6c040adc26bf729b5dddff8bb695307d5036a2a55fc86b29ef717925bbf8beaa445f6b59fed518463b354d0131d6e481c0418e24550c688eadb9d45c644fe2a3e87726541ca6b7f97707dbd38bbc93814ebc89105600c8181326daa6a1bdd394658a826611223a5f9aa3c9a6a26c37f090fa9893201cf6ec493ea6ed7200cab0dbb456b684de4a0cc0865982e0032ac08b21352ddb3d267228940ecd7f69d50fafd7df47b299a4629b0794a591cb62bf89ecb7bddac8b1fed77a9f64edd173060eb88317c4f401a8e5e4b9739569f060e377d30ee506bf137b56e642f4afcd9cb194bb86bf90ed767c5ded8a6fdbfd3c1f0489e3fd070cd999efaee046b7700febd7e430828b621d85bc737b5efb5a8b750288c323944ffc3ef0688cbb652739a6e060dc73d5ff28369f896c9ac888c36c5bc412a8f6a2ddd5f0013af292ad2bb25c38e84de7e5c7d4b24422365be0f2b0a1f7bfc7824b2d1a65f8915efbfea23952f91d4010b7807bcc7fad231539818f4f0c98920494dac60278815c99537f2c91f000918ea5cd1ce6f7a7d8753bea1b1ac6eceba31f8c1889809b1c9828f709c9d24767173b812ed68ab20ffa8288abaa6842daa5e604e152f51b02e90cce7e670c91224f0504251cc9b735fb9f3745580bb79ebc398f69926e66e8fd40c49c918e40d925a9615488ed0a21248e7fd826c1dd393653d91d127f1d7a69ae0234fddb5abd6eaa9345b805d48b2dcaf7739ea2e26e141267be923061257f5d3efee71d292c47fedfb9205b2131fc5b5c0223f8399f41ae8f7da9bef24214e5cb2e8973a81306bf22589c1ac3a77017b4e81a14d2c4b96b18777872e9d898194cf6bb7d1d7e391da90b1af1ae268e784ed9dbf758e6ac3aa7f2f4f13ba5e2bf7ee1faa80b6daa4acf0f1304a958401b14c1bbb5460cf91d5287f0435cf6bb192462426ee393a29c9693f35d0b58af1976b492da2848302f4ea8087d2b70e38fe8132e117964150581a7aaf897883ad99dc916fb2cad183b4e42cb093bb8ffac7aec9b0e8f95e9c8f916c2144f6912bdcce5d2be697e0098d2f562556d74f6333d56b86d7476de98eee1b1b811e9dd2937efebbbb6236e6d820de41df3a6fe34d9b0f6b666d670bdf84b7705c5cb15e041b6d1f6032feb5b79369f634fd0fe990cf0beaab7c98db72aed6b342dce405104d0b86c71af20e05811067d607a1880038bcc4b975d26d6f0d5eaf4d0e433238f4e7f7fa0b1ce365c9974a7ad144ec81e2e3ab86b2de5d471467b608b032ea52cd9a50c50010f881fc0114ef73c066bcd70f9a3022ef2c1f105cb137ab7d6adc9c55a013565decfb7fc8b85bb07565253c9adb01a3900b1aa1a27b5a141a9641e3720c6a37df9efcb831f2c5431dbba052fba178cbb52e657353973e1b1f4eac895b388f933b575e083965e30e7910ac795b8192681b981c6a97f156567f67fdfe8bffa47195de27a40d6cdbbfaf5aca89ffb7cdd052872939ed79c52ef45367931bcae55220f00278bbadeeec20bd97cd24412cf28d84caf0223aa84735e7e7133b29be4ee1d66d53d6c88ae977c438502ab1229df5ab3261117db088e4410f3a22eaebaac708d9582054b1950417222776ca8abe8b0aeef7df495d8a970aacb42267458addb74511a056ea3a0e8fad4b54c4d2057c131e0bcdad4f66753bb53e885cc67bc990b386a78b4ec12d123a3854278806f8388dbd1ed3aab4a7fa42b2fc00596c674a7a49f0c625b8301274518df2b334ec7c9ffdf88c985954cef7bc1e5012486d8a56e487896699cca194c0a04961b9bcf4b09d4e1a2b6e00008be596fe06257b10829ce26ab8548f7de920df9", 0x1000}, {&(0x7f0000002540)="1ede8925396e55f5d49376be9a2829f64076b55ea71355529bc022153f4c443fea0917e99f09470180d7bf4e91ae90cfc1aa421257911e7ba79cd529a02612c2860b4787f57e718cc0b43271bd6136984dddc10b2f0a8106c21dc1e9", 0x5c}, {&(0x7f00000025c0)="2a6969d90c88cb172e318329f36d70d797432ae48fe14366d7427d9b89ecde3ee5640661bc4e333ce4f2edcb8c22bdfd40381a43e7393a4f0fe757461f331c2a8e938ae0235e49991f3661722304e32a4fa6df214f789a4ff9139dd366e72c327b9be5ee200098668a282d00eb25302d43d7e789112e7f058c001a607564e82f1748caab", 0x84}, {&(0x7f0000002680)="4d404994dea70b3afcfa6b874895599ca90c3253d16b0a8a1a62085c235184c8ec2ead1616b2d49db5584cea62a9518e9f31b0dac330d627e37cdd98abefd288c4493c6355d59d387ff9b4cb8dae48d0f1d90b476d7768b82f4a518753c227bcf915fa86849423e74070a4014c1d55b079673968542eed9b675e0be07b98a782f9c73d3c4e7d98aeb7942a90f494ea778d2208ad556d053d99b0e4f22c083966b7c555b3b04d24d0cc5b4b3a43ce45fdcab92777ef779f4b9d58f45e2c5ac242c9931fdaf975ceedc89a1c280de66f789adb9258d8deccb0cbdafd965d16e55144bfa4dee0fada3fd90ef0ec00f48ea4394f", 0xf2}, {&(0x7f00000034c0)="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", 0x1000}], 0x8, &(0x7f0000002a40)=[@ip_ttl={{0x14, 0x0, 0x2, 0xc41}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x34, 0x0, 0x7, {[@cipso={0x86, 0x23, 0x4, [{0x0, 0x3, "13"}, {0x5, 0x3, "1d"}, {0x5, 0x9, "bd3f2544090e18"}, {0x2, 0xc, "2ffc04d47d53a4c3ce6b"}, {0x6, 0x2}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @local}}}, @ip_retopts={{0xf8, 0x0, 0x7, {[@cipso={0x86, 0x20, 0x9, [{0x0, 0x3, "13"}, {0x1, 0x11, "fb5f9b7b55dec128eefd5f6bb1e714"}, {0x2, 0x6, "03151686"}]}, @cipso={0x86, 0x65, 0x1, [{0x1, 0xf, "bb7ef6d15e5d4acaec95b21b6c"}, {0x6, 0x6, "b84f168a"}, {0x0, 0x4, "db1e"}, {0x6, 0x12, "4a1b25cb2576a6af7e2905f5ab070c43"}, {0x2, 0x7, "74f794567d"}, {0x1, 0xd, "c4d6c9a36706e0db908a90"}, {0x6, 0xc, "16aa71478abfb8f656a8"}, {0x5, 0x11, "d2264bac60029f50ec3237b917dbfd"}, {0x5, 0x3, "02"}]}, @rr={0x7, 0xb, 0xffff, [@empty, @rand_addr=0x100000001]}, @end, @noop, @cipso={0x86, 0x53, 0x401, [{0x7, 0xe, "83cb0ed0cdf3c1d3fa261995"}, {0x5, 0x11, "3448c0d517b310d1351514b7c24a94"}, {0x6, 0x5, "6ca9d1"}, {0x7, 0xb, "823ebfd48acdfebc9d"}, {0x6, 0xa, "7d63d857cb3e4571"}, {0x7, 0x7, "4031f0ad56"}, {0x5, 0xd, "a03b424af50501dcf0e23a"}]}, @noop]}}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x401, [@broadcast]}, @end, @end]}}}], 0x1a0}}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000002c00)="7cbb9e88427168cd50c4ce59ea68f6d5dde4ea533227efed98736e50c4cdda3579fefd3269d9e393b61cc5437794d8bfaffd50e7c93695ca41243b5d2b7dc9e5d36ecce9f2c25615ef2ad8466ade7ab271f4e3f1e1019839144e245cde0a2138823855bca680a1cefd4a88a3d137e7316881c0cb762556b7ae706c", 0x7b}], 0x1}}, {{&(0x7f0000002cc0)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000002fc0)=[{&(0x7f0000002d00)="269b451bfdfcb111141b6b8281618b2612b60ec2e0e54cb58093741792d72626b25ec1b75b81caab9d819da57685b25ecf509b1767c55184271aa3b9a347621bc648ceed94f2eeef4e50d4353ff47852e12cfc8f0cb0050c434adf5cd6196934d8c61578d178587ac0b5b04b824a1b3af11a18d231547cb8a34b9fb731cc1568e0", 0x81}, {&(0x7f0000002dc0)="a3e849e72feb053d34e480881f54ecfd17e602d4e7f64e91c36a437734963ec12c45e76013ce", 0x26}, {&(0x7f0000002e00)="bf78ba32dbc9dbcc69a404a68e6b464b718afca3322e8ada13b0bf047f055ee8014cb43af4febaf505b6438a67b13edcb696da8d941481543d5e4d5dcb6356ffcbd4f3f58faf140b890330ef62406db9ad3402b2302f2746b05eecf09a3d11146afc9c6b8c0a547eaf12", 0x6a}, {&(0x7f0000002e80)="a62b3b78b834ad3a21bf657bb773012df376b6e3c3595d6c769cb5a51eb869cccd9ff883029c3f44f318e0dc3bd17ba2eb16967f8079fd3ca5ab371eb19fcd7879c8a772774460b1f9f050e0ab2b26d92e5003ab12ab682187ea8f85", 0x5c}, {&(0x7f0000002f00)="d5ca680ecddfdeefa8ae78079dfd4ddd3ba328da274e5428b52078256086dad245fbfdb2b24859dfeb92326fafdf189d022e8fc3b31799da22398190c4e522a35dc3946647b05af51ab556ba0dae30f60e9fa552f6d82add5af1850656cf4f4847f06e2b38c51b0e255cf48fd2e9a197bd8fa02c7429052a5161eeb7cd3c5b7fc7a446eab5e799366d2488d3ba875417b899d638fad2705fddaef90d1a1e2bd5e25d93270395d5e3d66a8406efa4f64d", 0xb0}], 0x5, &(0x7f00000054c0)=[@ip_retopts={{0x74, 0x0, 0x7, {[@timestamp={0x44, 0x28, 0xf, 0x1, 0x20000, [{[@dev={0xac, 0x14, 0x14, 0x20}], 0x8}, {[], 0x80}, {[], 0x5}, {}, {[], 0x6}, {[@dev={0xac, 0x14, 0x14, 0x1d}], 0xaf1b}, {[], 0x4000000}]}, @noop, @generic={0x0, 0x12, "ac4d7a40eec02cae2e8abf163d582124"}, @rr={0x7, 0x1b, 0x9702, [@local, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1, @rand_addr=0xf98f]}, @ssrr={0x89, 0xb, 0x6, [@rand_addr=0x9, @dev={0xac, 0x14, 0x14, 0x23}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x401}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffffffffffffd}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x401}}, @ip_retopts={{0x60, 0x0, 0x7, {[@noop, @noop, @lsrr={0x83, 0x23, 0xf077, [@empty, @local, @rand_addr=0x9, @multicast1, @remote, @broadcast, @remote, @local]}, @ssrr={0x89, 0x13, 0x1, [@multicast2, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @cipso={0x86, 0x9, 0x7fff, [{0x0, 0x3, "c4"}]}, @lsrr={0x83, 0xf, 0xffffffffffffff5f, [@multicast1, @multicast1, @multicast2]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @loopback}}}], 0x1b0}}], 0x4, 0x1) sigaltstack(&(0x7f0000009000/0x1000)=nil, &(0x7f0000000080)) 10:01:25 executing program 0 (fault-call:4 fault-nth:43): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1450.139195][T16225] FAULT_INJECTION: forcing a failure. [ 1450.139195][T16225] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.162491][T16225] CPU: 1 PID: 16225 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1450.171622][T16225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.181680][T16225] Call Trace: [ 1450.184978][T16225] dump_stack+0x172/0x1f0 [ 1450.189323][T16225] should_fail.cold+0xa/0x15 [ 1450.193923][T16225] ? fault_create_debugfs_attr+0x180/0x180 [ 1450.199734][T16225] ? ___might_sleep+0x163/0x280 [ 1450.204590][T16225] __should_failslab+0x121/0x190 [ 1450.209539][T16225] should_failslab+0x9/0x14 [ 1450.214044][T16225] __kmalloc+0x2e0/0x770 [ 1450.218297][T16225] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1450.224454][T16225] ? ext4_find_extent+0x76e/0x9d0 [ 1450.229501][T16225] ext4_find_extent+0x76e/0x9d0 [ 1450.234378][T16225] ? __lockdep_free_key_range+0x120/0x120 [ 1450.240112][T16225] ext4_ext_map_blocks+0x1dc/0x5040 [ 1450.245331][T16225] ? ext4_ext_release+0x10/0x10 [ 1450.250205][T16225] ? __kasan_check_write+0x14/0x20 [ 1450.255316][T16225] ? down_read+0x109/0x430 [ 1450.259736][T16225] ? down_read_killable+0x490/0x490 [ 1450.264943][T16225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1450.271190][T16225] ? ext4_es_lookup_extent+0x408/0xce0 [ 1450.276665][T16225] ext4_map_blocks+0xdc7/0x17e0 [ 1450.281551][T16225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.287802][T16225] ? ext4_issue_zeroout+0x190/0x190 [ 1450.293017][T16225] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1450.299000][T16225] ? __kasan_check_write+0x14/0x20 [ 1450.304112][T16225] ext4_getblk+0xc4/0x570 [ 1450.308424][T16225] ? ext4_iomap_begin+0x1000/0x1000 [ 1450.313626][T16225] ext4_bread+0x8f/0x390 [ 1450.317875][T16225] ? ext4_getblk+0x570/0x570 [ 1450.322480][T16225] ext4_append+0x155/0x370 [ 1450.326892][T16225] ext4_mkdir+0x632/0xe20 [ 1450.331204][T16225] ? ext4_init_dot_dotdot+0x520/0x520 [ 1450.336563][T16225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.342791][T16225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.349007][T16225] ? security_inode_permission+0xcb/0x100 [ 1450.354716][T16225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.360964][T16225] ? security_inode_mkdir+0xe4/0x120 [ 1450.366228][T16225] vfs_mkdir+0x42e/0x670 [ 1450.370450][T16225] do_mkdirat+0x234/0x2a0 [ 1450.374770][T16225] ? __ia32_sys_mknod+0xb0/0xb0 [ 1450.379625][T16225] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1450.385066][T16225] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.391110][T16225] ? do_syscall_64+0x26/0x760 [ 1450.395780][T16225] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1450.401054][T16225] __x64_sys_mkdir+0x5c/0x80 [ 1450.405621][T16225] do_syscall_64+0xfa/0x760 [ 1450.410158][T16225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.416041][T16225] RIP: 0033:0x458c97 [ 1450.419926][T16225] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1450.439504][T16225] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1450.447888][T16225] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1450.455866][T16225] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1450.463832][T16225] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1450.471793][T16225] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1450.479741][T16225] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:28 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x100c) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000001300)='./file0\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x200001000000067, &(0x7f0000000280)=0x806, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10000, 0x0) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "214aa716bd8609c971fe52483ba6c49d51d6fa6c84961f26cdda595c05b5015032f6d21123bc2b1c3001e0d49af69267e189950e5eca538d280156c0e6dba0661c7fabfda64294a65301e1093cf3cd9e7c9a0ad5ecd175c3370c8b5a4b233772d81df7090b88a6777eb789e34141b6e124f8b138c64dcdb8c903dec9accf9a9d9fb0065bd98b058ec794c4f04f7a0555d069925087670b1c800444"}, 0x9f) 10:01:28 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r1 = getpid() syz_open_procfs(r1, &(0x7f00000003c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870x0, @in={{0x2, 0x4e24, @rand_addr=0x7}}, 0x41a842b0, 0x3, 0x9, 0x100000001}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x8}, &(0x7f0000000240)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$nl_generic(0x10, 0x3, 0x10) unshare(0x4000400) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000140)=0xd, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000040)=0x10, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000100)=0x10, 0x4) [ 1453.029315][T16250] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1453.035149][T16250] __should_failslab+0x121/0x190 [ 1453.040113][T16250] should_failslab+0x9/0x14 [ 1453.044629][T16250] kmem_cache_alloc+0x47/0x710 [ 1453.049402][T16250] ? __kasan_check_write+0x14/0x20 [ 1453.054509][T16250] ? do_raw_write_lock+0x124/0x290 [ 1453.054538][T16250] __es_insert_extent+0x2cc/0xf20 [ 1453.054571][T16250] ext4_es_insert_extent+0x2d2/0xa70 [ 1453.054602][T16250] ? ext4_es_scan_clu+0xe0/0xe0 [ 1453.054625][T16250] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1453.054655][T16250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1453.087068][T16250] ? ext4_es_find_extent_range+0x131/0x660 [ 1453.092910][T16250] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1453.098478][T16250] ? ext4_rereserve_cluster+0x240/0x240 [ 1453.104050][T16250] ? ext4_find_extent+0x76e/0x9d0 [ 1453.109110][T16250] ? ext4_find_extent+0x6a6/0x9d0 [ 1453.114175][T16250] ? __lockdep_free_key_range+0x120/0x120 [ 1453.119920][T16250] ext4_ext_map_blocks+0x20c4/0x5040 [ 1453.125240][T16250] ? ext4_ext_release+0x10/0x10 [ 1453.130134][T16250] ? __kasan_check_write+0x14/0x20 [ 1453.135265][T16250] ? down_read+0x109/0x430 [ 1453.139698][T16250] ? down_read_killable+0x490/0x490 [ 1453.144915][T16250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1453.151167][T16250] ? ext4_es_lookup_extent+0x408/0xce0 [ 1453.156655][T16250] ext4_map_blocks+0xdc7/0x17e0 [ 1453.161525][T16250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.167792][T16250] ? ext4_issue_zeroout+0x190/0x190 [ 1453.173019][T16250] ? rcu_read_lock_any_held.part.0+0x50/0x50 10:01:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0xfffffffffffffe63, 0x0, 0x0, 0x0, 0x54}}], 0x400000000000130, 0x40010026, 0x0) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001540)={'vcan0\x00', 0x0}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x47, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f00000001c0)={0x9, 0x2d, 0x8001, 'queue1\x00', 0x5}) sendmsg$can_raw(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "552f30fc1e5e162e"}, 0x10}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x60ff) [ 1453.179029][T16250] ? __kasan_check_write+0x14/0x20 [ 1453.184167][T16250] ext4_getblk+0xc4/0x570 [ 1453.188524][T16250] ? ext4_iomap_begin+0x1000/0x1000 [ 1453.193776][T16250] ext4_bread+0x8f/0x390 [ 1453.198036][T16250] ? ext4_getblk+0x570/0x570 [ 1453.202669][T16250] ext4_append+0x155/0x370 [ 1453.207115][T16250] ext4_mkdir+0x632/0xe20 [ 1453.211459][T16250] ? ext4_init_dot_dotdot+0x520/0x520 [ 1453.216958][T16250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.223239][T16250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.229509][T16250] ? security_inode_permission+0xcb/0x100 [ 1453.235260][T16250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.241527][T16250] ? security_inode_mkdir+0xe4/0x120 [ 1453.246845][T16250] vfs_mkdir+0x42e/0x670 [ 1453.251121][T16250] do_mkdirat+0x234/0x2a0 [ 1453.255474][T16250] ? __ia32_sys_mknod+0xb0/0xb0 [ 1453.260342][T16250] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1453.265822][T16250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.271908][T16250] ? do_syscall_64+0x26/0x760 [ 1453.276607][T16250] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1453.281921][T16250] __x64_sys_mkdir+0x5c/0x80 [ 1453.286528][T16250] do_syscall_64+0xfa/0x760 [ 1453.291073][T16250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.296986][T16250] RIP: 0033:0x458c97 [ 1453.300897][T16250] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.320781][T16250] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1453.329222][T16250] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1453.337227][T16250] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1453.345221][T16250] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1453.353212][T16250] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1453.361197][T16250] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:39 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x0, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000080)=@routing={0x87, 0x6, 0x0, 0x81, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="6d37103b82f3566a8f3480fa799b319a", @mcast2]}, 0x38) write$P9_RLERRORu(r1, &(0x7f0000000040)={0xd, 0x7, 0x2, {{}, 0xfff}}, 0xd) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) 10:01:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:39 executing program 2: add_key$user(0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000100)={0x62}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) kcmp(0x0, r2, 0x4, r0, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x4, 0x8, 0x4, 0x6, 0x0, 0x1, 0x10, 0x4, 0x3a9ba2d2, 0xffffffffffffff5a, 0x8, 0x3, 0x5, 0x400, 0x40, 0x7fff, 0x9, 0x7, 0x2, 0x9, 0x80, 0x0, 0x0, 0x7, 0x9, 0xfffffffffffffffb, 0x5, 0x101, 0x8001, 0x9, 0x48e, 0x1, 0xffffffff, 0x1, 0x8, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x100000001}, 0x10, 0x9, 0x1, 0x6, 0x80000000, 0xfffffffffffffff7, 0x2}, r2, 0x10, r1, 0x1) 10:01:39 executing program 0 (fault-call:4 fault-nth:45): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1463.532347][T16281] FAULT_INJECTION: forcing a failure. [ 1463.532347][T16281] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.605656][T16281] CPU: 0 PID: 16281 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1463.614812][T16281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.624881][T16281] Call Trace: [ 1463.628195][T16281] dump_stack+0x172/0x1f0 [ 1463.632550][T16281] should_fail.cold+0xa/0x15 [ 1463.637166][T16281] ? fault_create_debugfs_attr+0x180/0x180 [ 1463.642986][T16281] ? do_mkdirat+0x234/0x2a0 [ 1463.647511][T16281] ? generic_make_request_checks+0x761/0x2210 [ 1463.653608][T16281] __should_failslab+0x121/0x190 [ 1463.658570][T16281] should_failslab+0x9/0x14 [ 1463.663086][T16281] kmem_cache_alloc_node+0x56/0x740 [ 1463.668304][T16281] ? lock_downgrade+0x920/0x920 [ 1463.673190][T16281] create_task_io_context+0x33/0x450 [ 1463.678494][T16281] generic_make_request_checks+0x1b88/0x2210 [ 1463.684508][T16281] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 1463.692299][T16281] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1463.698125][T16281] ? perf_trace_run_bpf_submit+0x138/0x190 [ 1463.703967][T16281] ? perf_trace_lock+0x315/0x4c0 [ 1463.708927][T16281] generic_make_request+0x8f/0xb50 [ 1463.714063][T16281] ? blk_queue_enter+0xe50/0xe50 [ 1463.719016][T16281] ? guard_bio_eod+0x1cd/0x5a0 [ 1463.723799][T16281] ? find_held_lock+0x35/0x130 [ 1463.728577][T16281] ? guard_bio_eod+0x1cd/0x5a0 [ 1463.733366][T16281] submit_bio+0x113/0x600 [ 1463.737715][T16281] ? submit_bio+0x113/0x600 [ 1463.742235][T16281] ? generic_make_request+0xb50/0xb50 [ 1463.747626][T16281] ? __kasan_check_read+0x11/0x20 [ 1463.752674][T16281] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1463.758408][T16281] ? guard_bio_eod+0x294/0x5a0 [ 1463.763206][T16281] submit_bh_wbc+0x6b6/0x900 [ 1463.767824][T16281] __sync_dirty_buffer+0x12b/0x350 [ 1463.772954][T16281] sync_dirty_buffer+0x1b/0x20 [ 1463.777732][T16281] __ext4_handle_dirty_metadata+0x241/0x600 [ 1463.783635][T16281] ext4_getblk+0x368/0x570 [ 1463.788063][T16281] ? ext4_iomap_begin+0x1000/0x1000 [ 1463.793303][T16281] ext4_bread+0x8f/0x390 [ 1463.797552][T16281] ? ext4_getblk+0x570/0x570 [ 1463.802167][T16281] ext4_append+0x155/0x370 [ 1463.806609][T16281] ext4_mkdir+0x632/0xe20 [ 1463.810979][T16281] ? ext4_init_dot_dotdot+0x520/0x520 [ 1463.816368][T16281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.822622][T16281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.828878][T16281] ? security_inode_permission+0xcb/0x100 [ 1463.834620][T16281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.840876][T16281] ? security_inode_mkdir+0xe4/0x120 [ 1463.846186][T16281] vfs_mkdir+0x42e/0x670 [ 1463.850461][T16281] do_mkdirat+0x234/0x2a0 [ 1463.854816][T16281] ? __ia32_sys_mknod+0xb0/0xb0 [ 1463.859681][T16281] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1463.865162][T16281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.871241][T16281] ? do_syscall_64+0x26/0x760 [ 1463.875932][T16281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1463.881242][T16281] __x64_sys_mkdir+0x5c/0x80 [ 1463.885852][T16281] do_syscall_64+0xfa/0x760 [ 1463.890381][T16281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.896297][T16281] RIP: 0033:0x458c97 [ 1463.900204][T16281] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.920742][T16281] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1463.929167][T16281] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1463.937151][T16281] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1463.945132][T16281] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1463.953114][T16281] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1463.961095][T16281] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:41 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, 0x0, 0x0) 10:01:41 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 10:01:41 executing program 0 (fault-call:4 fault-nth:46): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1466.313239][T16299] FAULT_INJECTION: forcing a failure. [ 1466.313239][T16299] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.326098][T16299] CPU: 1 PID: 16299 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1466.335221][T16299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.345276][T16299] Call Trace: [ 1466.348575][T16299] dump_stack+0x172/0x1f0 [ 1466.352930][T16299] should_fail.cold+0xa/0x15 [ 1466.357555][T16299] ? fault_create_debugfs_attr+0x180/0x180 [ 1466.363383][T16299] __should_failslab+0x121/0x190 [ 1466.368330][T16299] should_failslab+0x9/0x14 [ 1466.372835][T16299] kmem_cache_alloc+0x47/0x710 [ 1466.377604][T16299] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1466.383324][T16299] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1466.388788][T16299] ? do_raw_write_lock+0x124/0x290 [ 1466.393907][T16299] __es_insert_extent+0x2cc/0xf20 [ 1466.398948][T16299] ext4_es_insert_extent+0x2d2/0xa70 [ 1466.404243][T16299] ? ext4_es_scan_clu+0xe0/0xe0 [ 1466.409103][T16299] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1466.415345][T16299] ? ext4_es_lookup_extent+0x408/0xce0 [ 1466.420825][T16299] ext4_map_blocks+0x7ed/0x17e0 [ 1466.425697][T16299] ? ext4_issue_zeroout+0x190/0x190 [ 1466.430919][T16299] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1466.436908][T16299] ? __kasan_check_write+0x14/0x20 [ 1466.442035][T16299] ext4_getblk+0xc4/0x570 [ 1466.446377][T16299] ? ext4_iomap_begin+0x1000/0x1000 [ 1466.451659][T16299] ext4_bread+0x8f/0x390 10:01:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 10:01:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1466.458006][T16299] ? ext4_getblk+0x570/0x570 [ 1466.465487][T16299] ext4_append+0x155/0x370 [ 1466.469920][T16299] ext4_mkdir+0x632/0xe20 [ 1466.474269][T16299] ? ext4_init_dot_dotdot+0x520/0x520 [ 1466.479651][T16299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1466.485895][T16299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1466.492153][T16299] ? security_inode_permission+0xcb/0x100 [ 1466.497883][T16299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1466.504128][T16299] ? security_inode_mkdir+0xe4/0x120 [ 1466.509424][T16299] vfs_mkdir+0x42e/0x670 [ 1466.513679][T16299] do_mkdirat+0x234/0x2a0 [ 1466.518021][T16299] ? __ia32_sys_mknod+0xb0/0xb0 [ 1466.523685][T16299] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1466.529151][T16299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.535223][T16299] ? do_syscall_64+0x26/0x760 [ 1466.539911][T16299] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1466.545208][T16299] __x64_sys_mkdir+0x5c/0x80 [ 1466.549812][T16299] do_syscall_64+0xfa/0x760 [ 1466.554333][T16299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.560228][T16299] RIP: 0033:0x458c97 [ 1466.564126][T16299] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.583770][T16299] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1466.592185][T16299] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1466.600161][T16299] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1466.608139][T16299] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1466.616112][T16299] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1466.624089][T16299] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:53 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x0, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:01:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x0) 10:01:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:53 executing program 0 (fault-call:4 fault-nth:47): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:01:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) 10:01:53 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1478.150561][T16333] FAULT_INJECTION: forcing a failure. [ 1478.150561][T16333] name failslab, interval 1, probability 0, space 0, times 0 [ 1478.163524][T16333] CPU: 0 PID: 16333 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1478.172655][T16333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1478.182724][T16333] Call Trace: [ 1478.182753][T16333] dump_stack+0x172/0x1f0 [ 1478.182781][T16333] should_fail.cold+0xa/0x15 [ 1478.194974][T16333] ? fault_create_debugfs_attr+0x180/0x180 [ 1478.200821][T16333] __should_failslab+0x121/0x190 [ 1478.205773][T16333] should_failslab+0x9/0x14 [ 1478.210284][T16333] kmem_cache_alloc+0x47/0x710 [ 1478.215052][T16333] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1478.220785][T16333] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1478.226271][T16333] ? do_raw_write_lock+0x124/0x290 [ 1478.231424][T16333] __es_insert_extent+0x2cc/0xf20 [ 1478.236477][T16333] ext4_es_insert_extent+0x2d2/0xa70 [ 1478.236504][T16333] ? ext4_es_scan_clu+0xe0/0xe0 [ 1478.246634][T16333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1478.252896][T16333] ? ext4_es_lookup_extent+0x408/0xce0 [ 1478.258398][T16333] ext4_map_blocks+0x7ed/0x17e0 [ 1478.263291][T16333] ? ext4_issue_zeroout+0x190/0x190 [ 1478.268525][T16333] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1478.274533][T16333] ? __kasan_check_write+0x14/0x20 [ 1478.279684][T16333] ext4_getblk+0xc4/0x570 [ 1478.284044][T16333] ? ext4_iomap_begin+0x1000/0x1000 [ 1478.289279][T16333] ext4_bread+0x8f/0x390 [ 1478.293541][T16333] ? ext4_getblk+0x570/0x570 [ 1478.298161][T16333] ext4_append+0x155/0x370 [ 1478.302601][T16333] ext4_mkdir+0x632/0xe20 [ 1478.306957][T16333] ? ext4_init_dot_dotdot+0x520/0x520 [ 1478.312354][T16333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1478.318636][T16333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1478.324886][T16333] ? security_inode_permission+0xcb/0x100 [ 1478.330608][T16333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1478.336861][T16333] ? security_inode_mkdir+0xe4/0x120 [ 1478.342171][T16333] vfs_mkdir+0x42e/0x670 [ 1478.346453][T16333] do_mkdirat+0x234/0x2a0 [ 1478.350803][T16333] ? __ia32_sys_mknod+0xb0/0xb0 [ 1478.355668][T16333] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1478.361148][T16333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1478.367231][T16333] ? do_syscall_64+0x26/0x760 [ 1478.371928][T16333] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1478.377248][T16333] __x64_sys_mkdir+0x5c/0x80 [ 1478.381873][T16333] do_syscall_64+0xfa/0x760 [ 1478.386412][T16333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1478.392320][T16333] RIP: 0033:0x458c97 [ 1478.396232][T16333] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1478.415838][T16333] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1478.415858][T16333] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1478.415874][T16333] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1478.440209][T16333] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 10:01:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:01:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) fchmod(0xffffffffffffffff, 0xc0) 10:01:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1478.448284][T16333] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1478.456260][T16333] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:01:54 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 10:01:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:09 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:02:09 executing program 4: r0 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="8e5c9b9fa72b0a6dce2308", 0xb}, {&(0x7f0000000880)="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", 0x1000}], 0x2, r1) clock_settime(0x0, &(0x7f0000000840)={0xffffffffffffffff}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = socket(0xb, 0xa, 0x80000000) getsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f00000002c0)=""/250, &(0x7f00000003c0)=0xfa) chown(&(0x7f0000000080)='./file0\x00', r2, r3) 10:02:09 executing program 0 (fault-call:4 fault-nth:48): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) flock(r0, 0x1) link(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') 10:02:09 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1493.578296][T16374] FAULT_INJECTION: forcing a failure. [ 1493.578296][T16374] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.591857][T16374] CPU: 0 PID: 16374 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1493.600997][T16374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.611063][T16374] Call Trace: [ 1493.614373][T16374] dump_stack+0x172/0x1f0 [ 1493.618728][T16374] should_fail.cold+0xa/0x15 [ 1493.623344][T16374] ? fault_create_debugfs_attr+0x180/0x180 [ 1493.629172][T16374] ? __lockdep_free_key_range+0x120/0x120 [ 1493.634926][T16374] __should_failslab+0x121/0x190 [ 1493.639892][T16374] should_failslab+0x9/0x14 [ 1493.644416][T16374] kmem_cache_alloc+0x47/0x710 [ 1493.649201][T16374] ? ___might_sleep+0x163/0x280 [ 1493.654076][T16374] ? mempool_alloc+0x380/0x380 [ 1493.658852][T16374] mempool_alloc_slab+0x47/0x60 [ 1493.663722][T16374] mempool_alloc+0x169/0x380 [ 1493.668336][T16374] ? mempool_destroy+0x40/0x40 [ 1493.673120][T16374] ? __kasan_check_read+0x11/0x20 [ 1493.678165][T16374] ? __lockdep_free_key_range+0x120/0x120 [ 1493.683899][T16374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.690176][T16374] bio_alloc_bioset+0x3b9/0x680 [ 1493.695044][T16374] ? mark_buffer_dirty_inode+0x305/0x410 [ 1493.700699][T16374] ? bvec_alloc+0x2f0/0x2f0 [ 1493.705227][T16374] submit_bh_wbc+0x1c5/0x900 [ 1493.709850][T16374] __sync_dirty_buffer+0x12b/0x350 [ 1493.714991][T16374] sync_dirty_buffer+0x1b/0x20 [ 1493.719777][T16374] __ext4_handle_dirty_metadata+0x241/0x600 10:02:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1493.725706][T16374] ext4_getblk+0x368/0x570 [ 1493.730147][T16374] ? ext4_iomap_begin+0x1000/0x1000 [ 1493.735389][T16374] ext4_bread+0x8f/0x390 [ 1493.739649][T16374] ? ext4_getblk+0x570/0x570 [ 1493.744275][T16374] ext4_append+0x155/0x370 [ 1493.748722][T16374] ext4_mkdir+0x632/0xe20 [ 1493.753090][T16374] ? ext4_init_dot_dotdot+0x520/0x520 [ 1493.758481][T16374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.764735][T16374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.771003][T16374] ? security_inode_permission+0xcb/0x100 10:02:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1493.776747][T16374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.783005][T16374] ? security_inode_mkdir+0xe4/0x120 [ 1493.788315][T16374] vfs_mkdir+0x42e/0x670 [ 1493.792587][T16374] do_mkdirat+0x234/0x2a0 [ 1493.796934][T16374] ? __ia32_sys_mknod+0xb0/0xb0 [ 1493.801801][T16374] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1493.807273][T16374] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.813345][T16374] ? do_syscall_64+0x26/0x760 [ 1493.818034][T16374] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1493.823338][T16374] __x64_sys_mkdir+0x5c/0x80 [ 1493.827957][T16374] do_syscall_64+0xfa/0x760 [ 1493.832484][T16374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.838384][T16374] RIP: 0033:0x458c97 [ 1493.842291][T16374] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.861905][T16374] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1493.870366][T16374] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 10:02:09 executing program 2: timerfd_create(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x2) 10:02:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x182, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="9ca54600000000"], 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x6b6a) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) 10:02:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1493.878347][T16374] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1493.886351][T16374] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1493.894347][T16374] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1493.902325][T16374] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:09 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) ppoll(&(0x7f0000000180)=[{r0, 0x10}, {r0, 0x10}, {r0, 0x20}, {r0, 0x8}, {r0, 0x484}, {r0, 0x2}, {r0, 0x80}, {r0}], 0x8, &(0x7f00000001c0), &(0x7f0000000200)={0x10000}, 0x8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x18000, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000280), 0x4) nanosleep(0x0, &(0x7f0000000300)) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) flock(r0, 0x2) accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x80000) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f00000000c0)=""/121) 10:02:19 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:02:19 executing program 0 (fault-call:4 fault-nth:49): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:19 executing program 2: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(0xffffffffffffffff, 0xc0044306, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000000)={0x826f10078ace0b97, 0x0, {0x1, 0x100, 0x300f, 0x1, 0xb, 0x6, 0x3, 0x7}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40045402, 0x0) 10:02:19 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x40000) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000001c0)={0x0, @output={0x1000, 0x1, {0x400, 0x8}, 0x8001}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r1, 0x0, &(0x7f0000000000)=0xffffffffffffff91) fcntl$setpipe(r1, 0x407, 0x7fff) r2 = gettid() waitid(0x2, r2, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) 10:02:19 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:02:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x40, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r1, r2, 0x1b}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@norecovery='norecovery'}]}) r3 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f00000000c0)={0x0, 0x5, 0x0, 0x1, 0x101, 0x7, 0x2}) 10:02:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1504.128945][T16422] FAULT_INJECTION: forcing a failure. [ 1504.128945][T16422] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.149823][T16422] CPU: 1 PID: 16422 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1504.158970][T16422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.169037][T16422] Call Trace: [ 1504.172344][T16422] dump_stack+0x172/0x1f0 [ 1504.176694][T16422] should_fail.cold+0xa/0x15 [ 1504.181301][T16422] ? fault_create_debugfs_attr+0x180/0x180 [ 1504.187126][T16422] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1504.193299][T16422] __should_failslab+0x121/0x190 [ 1504.198246][T16422] should_failslab+0x9/0x14 [ 1504.202745][T16422] kmem_cache_alloc+0x47/0x710 [ 1504.207511][T16422] ? ___might_sleep+0x163/0x280 [ 1504.212362][T16422] ? mempool_alloc+0x380/0x380 [ 1504.217119][T16422] mempool_alloc_slab+0x47/0x60 [ 1504.221963][T16422] mempool_alloc+0x169/0x380 [ 1504.226548][T16422] ? perf_trace_lock+0xeb/0x4c0 [ 1504.231399][T16422] ? mempool_destroy+0x40/0x40 [ 1504.236168][T16422] ? __unlock_page_memcg+0x53/0x100 [ 1504.241362][T16422] ? find_held_lock+0x35/0x130 [ 1504.246123][T16422] ? __unlock_page_memcg+0x53/0x100 [ 1504.251323][T16422] bio_alloc_bioset+0x3b9/0x680 [ 1504.256169][T16422] ? lock_acquire+0x190/0x410 [ 1504.260844][T16422] ? bvec_alloc+0x2f0/0x2f0 [ 1504.265348][T16422] ? __kasan_check_read+0x11/0x20 [ 1504.270375][T16422] submit_bh_wbc+0x1c5/0x900 [ 1504.274973][T16422] __sync_dirty_buffer+0x12b/0x350 [ 1504.280089][T16422] sync_dirty_buffer+0x1b/0x20 [ 1504.284850][T16422] __ext4_handle_dirty_metadata+0x241/0x600 [ 1504.290743][T16422] ext4_handle_dirty_dirblock+0x3ae/0x4c0 [ 1504.296463][T16422] ? ext4_rename_dir_prepare+0x470/0x470 [ 1504.302096][T16422] ? timespec64_trunc+0x180/0x180 [ 1504.307120][T16422] ? ext4_insert_dentry+0x3c3/0x490 [ 1504.312323][T16422] add_dirent_to_buf+0x410/0x690 [ 1504.317261][T16422] ? ext4_insert_dentry+0x490/0x490 [ 1504.322456][T16422] ? __ext4_read_dirblock+0x2d0/0xbe0 [ 1504.327830][T16422] ext4_add_entry+0x6a2/0xdf0 [ 1504.332511][T16422] ? make_indexed_dir+0x1310/0x1310 [ 1504.337714][T16422] ? memcpy+0x46/0x50 [ 1504.341702][T16422] ext4_mkdir+0x756/0xe20 [ 1504.346045][T16422] ? ext4_init_dot_dotdot+0x520/0x520 [ 1504.351420][T16422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1504.357656][T16422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1504.363983][T16422] ? security_inode_permission+0xcb/0x100 [ 1504.369707][T16422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1504.375938][T16422] ? security_inode_mkdir+0xe4/0x120 [ 1504.381242][T16422] vfs_mkdir+0x42e/0x670 [ 1504.385490][T16422] do_mkdirat+0x234/0x2a0 [ 1504.389822][T16422] ? __ia32_sys_mknod+0xb0/0xb0 [ 1504.394671][T16422] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1504.400128][T16422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.406186][T16422] ? do_syscall_64+0x26/0x760 [ 1504.410863][T16422] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1504.416152][T16422] __x64_sys_mkdir+0x5c/0x80 [ 1504.420738][T16422] do_syscall_64+0xfa/0x760 [ 1504.425245][T16422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.431129][T16422] RIP: 0033:0x458c97 [ 1504.435024][T16422] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1504.454882][T16422] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1504.463287][T16422] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1504.471249][T16422] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1504.479215][T16422] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1504.487176][T16422] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1504.495141][T16422] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1504.508864][T11334] block nbd2: Receive control failed (result -22) [ 1504.565433][T16419] block nbd2: shutting down sockets 10:02:20 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x201, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc9, &(0x7f0000000200)=0x400, 0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r1, 0x6, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in=@local, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x40}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000100)={0x3, r4}) bind$bt_hci(r2, &(0x7f0000000380)={0x1f, r3, 0x1}, 0xc) ioctl$KDDELIO(r2, 0x4b35, 0x80) 10:02:20 executing program 0 (fault-call:4 fault-nth:50): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x4300, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000200)="b9800000c00f3235000100000f3048b8568b929eb42e3b020f23c00f21f835010003000f23f8440f01ca66b858008ec00f20d835200000000f22d866bad004ec650f01cf66baf80cb8bb6e038fef66bafc0cec363e450f3066b85e008ed8", 0x5e}], 0x155555f4, 0x0, 0x0, 0x2f5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000004, 0x0, 0x0, 0x0, 0x4cc]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:02:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1504.874653][T16454] FAULT_INJECTION: forcing a failure. [ 1504.874653][T16454] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.924090][T16454] CPU: 0 PID: 16454 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1504.933265][T16454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.943332][T16454] Call Trace: [ 1504.946656][T16454] dump_stack+0x172/0x1f0 [ 1504.951019][T16454] should_fail.cold+0xa/0x15 [ 1504.955617][T16454] ? fault_create_debugfs_attr+0x180/0x180 [ 1504.961412][T16454] ? generic_make_request+0x8d3/0xb50 [ 1504.966772][T16454] ? generic_make_request+0x53c/0xb50 [ 1504.972138][T16454] __should_failslab+0x121/0x190 [ 1504.977065][T16454] should_failslab+0x9/0x14 [ 1504.981553][T16454] kmem_cache_alloc+0x47/0x710 [ 1504.986305][T16454] ? ___might_sleep+0x163/0x280 [ 1504.991144][T16454] ? mempool_alloc+0x380/0x380 [ 1504.995919][T16454] mempool_alloc_slab+0x47/0x60 [ 1505.000784][T16454] mempool_alloc+0x169/0x380 [ 1505.005390][T16454] ? mempool_destroy+0x40/0x40 [ 1505.010174][T16454] ? __unlock_page_memcg+0x53/0x100 [ 1505.015378][T16454] ? find_held_lock+0x35/0x130 [ 1505.020143][T16454] ? __unlock_page_memcg+0x53/0x100 [ 1505.025332][T16454] bio_alloc_bioset+0x3b9/0x680 [ 1505.030187][T16454] ? lock_acquire+0x190/0x410 [ 1505.034852][T16454] ? bvec_alloc+0x2f0/0x2f0 [ 1505.039339][T16454] ? __kasan_check_read+0x11/0x20 [ 1505.044378][T16454] submit_bh_wbc+0x1c5/0x900 [ 1505.048971][T16454] __sync_dirty_buffer+0x12b/0x350 [ 1505.054067][T16454] sync_dirty_buffer+0x1b/0x20 [ 1505.058833][T16454] __ext4_handle_dirty_metadata+0x241/0x600 [ 1505.064733][T16454] ext4_handle_dirty_dirblock+0x3ae/0x4c0 [ 1505.070444][T16454] ? ext4_rename_dir_prepare+0x470/0x470 [ 1505.076062][T16454] ? memcpy+0x46/0x50 [ 1505.080053][T16454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.086283][T16454] ? ext4_init_dot_dotdot+0x39c/0x520 [ 1505.091655][T16454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.097892][T16454] ext4_mkdir+0x6e0/0xe20 [ 1505.102259][T16454] ? ext4_init_dot_dotdot+0x520/0x520 [ 1505.107629][T16454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.113851][T16454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.120090][T16454] ? security_inode_permission+0xcb/0x100 [ 1505.125807][T16454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.132033][T16454] ? security_inode_mkdir+0xe4/0x120 [ 1505.137309][T16454] vfs_mkdir+0x42e/0x670 [ 1505.141552][T16454] do_mkdirat+0x234/0x2a0 [ 1505.145873][T16454] ? __ia32_sys_mknod+0xb0/0xb0 [ 1505.150710][T16454] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1505.156158][T16454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.162206][T16454] ? do_syscall_64+0x26/0x760 [ 1505.166886][T16454] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1505.172171][T16454] __x64_sys_mkdir+0x5c/0x80 [ 1505.176748][T16454] do_syscall_64+0xfa/0x760 [ 1505.181242][T16454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.187143][T16454] RIP: 0033:0x458c97 [ 1505.191024][T16454] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1505.210611][T16454] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1505.219030][T16454] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1505.226996][T16454] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1505.234952][T16454] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1505.242907][T16454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1505.250873][T16454] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:28 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:02:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:28 executing program 2: connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vsock\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000001380)=@req3={0x5, 0x6, 0x7ff, 0x10001, 0x6, 0x7b, 0x1}, 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001680)={r1, &(0x7f0000001440)="9867ef109dc59bd5ef89b0fdff77d72de661775c711b339081e2458718f49970653032cb14216dcc0f254fefc0e57fd9d47159ce5ceb11f8eff8aa0a1de5db6cfdcbf0e6d28b9f42ba8079153dbe39024baa3e6cb6886fc123fc1acdc575bc3c960e6765dfbdc4bdc1ea757756faf528a6fa0ce3cd4c2701ed9a2a6b75a40cbf8153d8ced85ff5c8892ddf943e17abaaf11686861ada852639e711bd6a773c5d359acebdc89346104a490ab08db491909400290339e72e06e7fafda471a75d0f2860374d619527feb82b3c0ce2508ba453afdad68372860a608e78", &(0x7f0000001580)=""/253}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0xe063305c3a14ce1e, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000001400)='/dev/vcs#\x00', 0x8, 0x4000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB="000c43bd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x2}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 10:02:28 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x10, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000001c0)="01825ad9be157164b36c7518c2e9db7f37f827bf62a765cef55ea740518b96753894f87ad1f1c8f3edce1507f4f1c00f6eaa5297113005e1b0a3f72db8d590fba266b669009090ead7af1e904d3c3d164e99e3bea96a3738b74fad05b74e0060f76348fc64732cbeb4d5c60446f37da7f993d4f2e011abc51e6fd4e2acc7cc572713bf97af3335a0e4db96e0d8a82158dfe87dac2a989be1698e406ebd48500341dc6068a3c40a76efbdad97d0fd5b25fb7e9ae970561cdcfe1c575a7227a0b0fff50540f786c6d092c29bb77a7a9e7aeb"}, 0x10) 10:02:28 executing program 0 (fault-call:4 fault-nth:51): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:28 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 10:02:29 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xe5d8, 0x40) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@fwd={0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}]}, {0x0, [0x5f]}}, &(0x7f0000000080)=""/247, 0x3f, 0xf7, 0x1}, 0x20) 10:02:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1513.421902][T16476] FAULT_INJECTION: forcing a failure. [ 1513.421902][T16476] name failslab, interval 1, probability 0, space 0, times 0 [ 1513.514260][T16476] CPU: 1 PID: 16476 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1513.523414][T16476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.533481][T16476] Call Trace: [ 1513.536782][T16476] dump_stack+0x172/0x1f0 [ 1513.541124][T16476] should_fail.cold+0xa/0x15 [ 1513.545722][T16476] ? fault_create_debugfs_attr+0x180/0x180 [ 1513.551539][T16476] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1513.557350][T16476] ? debug_smp_processor_id+0x3c/0x214 10:02:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000340)={0x43, 0x9, 0x1, {0x8001, 0x40, 0x0, 0x0, 0x3, 0x7, 0x0, 0x3, 0x80}}, 0x43) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) setreuid(0x0, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000080)={0x8, 0x3, 0xfff, 0x1000, 0x80, 0x2, 0x401}) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0xfffffe74) write$apparmor_current(r1, &(0x7f00000000c0)=@profile={'permprofile ', 'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00'}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000211, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) [ 1513.562822][T16476] __should_failslab+0x121/0x190 [ 1513.567786][T16476] should_failslab+0x9/0x14 [ 1513.572291][T16476] kmem_cache_alloc+0x47/0x710 [ 1513.577063][T16476] ? ___might_sleep+0x163/0x280 [ 1513.581920][T16476] ? mempool_alloc+0x380/0x380 [ 1513.586684][T16476] mempool_alloc_slab+0x47/0x60 [ 1513.591538][T16476] mempool_alloc+0x169/0x380 [ 1513.596140][T16476] ? mempool_destroy+0x40/0x40 [ 1513.600914][T16476] ? __unlock_page_memcg+0x53/0x100 [ 1513.606120][T16476] ? find_held_lock+0x35/0x130 10:02:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x80, &(0x7f0000ffc000/0x3000)=nil, 0x73}) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x06', 0xffffffffffffffff, 0x6c00}, &(0x7f0000001fee)='R\trusB\xe3cusgrVex:1e', 0x0) [ 1513.610888][T16476] ? __unlock_page_memcg+0x53/0x100 [ 1513.616094][T16476] bio_alloc_bioset+0x3b9/0x680 [ 1513.620948][T16476] ? lock_acquire+0x190/0x410 [ 1513.625635][T16476] ? bvec_alloc+0x2f0/0x2f0 [ 1513.630145][T16476] ? __kasan_check_read+0x11/0x20 [ 1513.635186][T16476] submit_bh_wbc+0x1c5/0x900 [ 1513.639772][T16476] __sync_dirty_buffer+0x12b/0x350 [ 1513.644863][T16476] sync_dirty_buffer+0x1b/0x20 [ 1513.649610][T16476] __ext4_handle_dirty_metadata+0x241/0x600 [ 1513.655590][T16476] ext4_handle_dirty_dirblock+0x3ae/0x4c0 [ 1513.661322][T16476] ? ext4_rename_dir_prepare+0x470/0x470 [ 1513.666945][T16476] ? timespec64_trunc+0x180/0x180 [ 1513.671950][T16476] ? ext4_insert_dentry+0x3c3/0x490 [ 1513.677186][T16476] add_dirent_to_buf+0x410/0x690 [ 1513.682110][T16476] ? ext4_insert_dentry+0x490/0x490 [ 1513.688340][T16476] ? __ext4_read_dirblock+0x2d0/0xbe0 [ 1513.693720][T16476] ext4_add_entry+0x6a2/0xdf0 [ 1513.698395][T16476] ? make_indexed_dir+0x1310/0x1310 [ 1513.703597][T16476] ? memcpy+0x46/0x50 [ 1513.707576][T16476] ext4_mkdir+0x756/0xe20 [ 1513.711892][T16476] ? ext4_init_dot_dotdot+0x520/0x520 [ 1513.717260][T16476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.723503][T16476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.729739][T16476] ? security_inode_permission+0xcb/0x100 [ 1513.735454][T16476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.741704][T16476] ? security_inode_mkdir+0xe4/0x120 [ 1513.746976][T16476] vfs_mkdir+0x42e/0x670 [ 1513.751216][T16476] do_mkdirat+0x234/0x2a0 [ 1513.755548][T16476] ? __ia32_sys_mknod+0xb0/0xb0 [ 1513.760398][T16476] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1513.765857][T16476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.771912][T16476] ? do_syscall_64+0x26/0x760 [ 1513.776582][T16476] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1513.781860][T16476] __x64_sys_mkdir+0x5c/0x80 [ 1513.786434][T16476] do_syscall_64+0xfa/0x760 [ 1513.790923][T16476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.796804][T16476] RIP: 0033:0x458c97 [ 1513.800687][T16476] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.820268][T16476] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1513.828657][T16476] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1513.836614][T16476] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 1513.844581][T16476] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1513.852554][T16476] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1513.860517][T16476] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:29 executing program 0 (fault-call:4 fault-nth:52): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1514.195799][T16511] FAULT_INJECTION: forcing a failure. [ 1514.195799][T16511] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.219433][T16511] CPU: 1 PID: 16511 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1514.228568][T16511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.238619][T16511] Call Trace: [ 1514.241908][T16511] dump_stack+0x172/0x1f0 [ 1514.246258][T16511] should_fail.cold+0xa/0x15 [ 1514.250862][T16511] ? fault_create_debugfs_attr+0x180/0x180 [ 1514.256686][T16511] ? ___might_sleep+0x163/0x280 [ 1514.261552][T16511] __should_failslab+0x121/0x190 [ 1514.266493][T16511] should_failslab+0x9/0x14 [ 1514.270980][T16511] __kmalloc_track_caller+0x2dc/0x760 [ 1514.276362][T16511] ? setup_sigcontext+0x7d0/0x7d0 [ 1514.281411][T16511] ? __bad_area_nosemaphore+0xb3/0x420 [ 1514.286879][T16511] ? strndup_user+0x77/0xd0 [ 1514.291387][T16511] memdup_user+0x26/0xb0 [ 1514.295628][T16511] strndup_user+0x77/0xd0 [ 1514.299970][T16511] ksys_mount+0x3c/0x150 [ 1514.304222][T16511] __x64_sys_mount+0xbe/0x150 [ 1514.308914][T16511] do_syscall_64+0xfa/0x760 [ 1514.313509][T16511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.319383][T16511] RIP: 0033:0x45c2ca [ 1514.323260][T16511] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1514.342842][T16511] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1514.351241][T16511] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1514.359205][T16511] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1514.367159][T16511] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1514.375108][T16511] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1514.383065][T16511] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) creat(&(0x7f0000000380)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setlease(r1, 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(&(0x7f0000000080)='./bus\x00', 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) finit_module(r3, &(0x7f00000001c0)='\")systemnodev\x00', 0x3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @empty}, &(0x7f0000000140)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000180)={r4, @loopback, @rand_addr=0xae}, 0xc) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18}], 0x18}], 0x1, 0x0) 10:02:38 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(0xffffffffffffffff, &(0x7f0000000700), 0x10000000000000ea) 10:02:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:38 executing program 0 (fault-call:4 fault-nth:53): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='./file0\x00') modify_ldt$write2(0x11, &(0x7f0000000300)={0x405}, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x64, r1, 0xd833d326f3e83d37, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @empty}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, [], 0x20}}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4000) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) sched_setparam(0x0, &(0x7f0000000180)) clone(0x22086607, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) 10:02:38 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) [ 1522.542141][T16525] FAULT_INJECTION: forcing a failure. [ 1522.542141][T16525] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.576383][T16525] CPU: 0 PID: 16525 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1522.585535][T16525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.594794][ T26] audit: type=1804 audit(1567245758.241:54): pid=16532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir715132310/syzkaller.pTgYbN/208/bus" dev="sda1" ino=16612 res=1 [ 1522.595591][T16525] Call Trace: [ 1522.595620][T16525] dump_stack+0x172/0x1f0 [ 1522.595652][T16525] should_fail.cold+0xa/0x15 [ 1522.632218][T16525] ? fault_create_debugfs_attr+0x180/0x180 [ 1522.638055][T16525] ? ___might_sleep+0x163/0x280 [ 1522.642942][T16525] __should_failslab+0x121/0x190 [ 1522.647907][T16525] should_failslab+0x9/0x14 [ 1522.652424][T16525] __kmalloc_track_caller+0x2dc/0x760 [ 1522.657822][T16525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1522.664082][T16525] ? strndup_user+0x77/0xd0 [ 1522.668603][T16525] memdup_user+0x26/0xb0 [ 1522.672867][T16525] strndup_user+0x77/0xd0 [ 1522.677217][T16525] ksys_mount+0x7b/0x150 [ 1522.681481][T16525] __x64_sys_mount+0xbe/0x150 [ 1522.686183][T16525] do_syscall_64+0xfa/0x760 10:02:38 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x7, 0x80) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) connect(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x2710, @my=0x1}, 0x80) [ 1522.690713][T16525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.695585][ T26] audit: type=1804 audit(1567245758.241:55): pid=16533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir715132310/syzkaller.pTgYbN/208/bus" dev="sda1" ino=16612 res=1 [ 1522.696608][T16525] RIP: 0033:0x45c2ca 10:02:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:38 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) socket$inet_sctp(0x2, 0xfa165919e8098a46, 0x84) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc004240a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000280)) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x404640) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000040)={0x1}) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x9, @raw_data="1fcb46d02ab6c63c594d36317b3a75537c49b43893fc974900400000463f0437f7ffd8500d384ced6347be0711b5c9cc1bf51d241901c2c02cf411338e817d388054685cbb344a3e0244c4ef0915c7c51d07d272610817ba58559342ce7918de9a85638015aef9a5e3cd6a7c9367289b69f9d462ebe0785411a26cfb487d7bc2a5456cb92cfdad5d3c088a2861de26cdb810b47f7095d5b1a0cf189b5b2fc861f8104c4c07882c2e8345bea52167e2d4f9e707d8df10dfbc8b3f2de6d19f8cec666e98588ed484ee"}) [ 1522.696626][T16525] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1522.696640][T16525] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1522.752893][T16525] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1522.760864][T16525] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1522.768833][T16525] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1522.768844][T16525] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1522.768855][T16525] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:38 executing program 0 (fault-call:4 fault-nth:54): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x0) r1 = getpgrp(0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x5, @mcast1, 0xd1}, @in6={0xa, 0x4e24, 0x0, @rand_addr="3cea4f6335d3a7aaf6b8d160c14a21dc", 0x44}], 0x38) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0xfffffffffffffff8, 0x2}}, 0x30) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000003c0)={r3, 0x3, &(0x7f0000000200)=[0x4, 0x19, 0x0], &(0x7f0000000240)=[0x2, 0x4, 0x3, 0x5, 0x0, 0xb170, 0x0, 0x1, 0x7], 0x20, 0x2, 0x1, &(0x7f0000000280)=[0x1, 0x8000], &(0x7f0000000380)=[0xfffffffffffffff9, 0x4, 0x9]}) sendmsg$netlink(r2, &(0x7f0000000440)={0x0, 0xfdb9, 0x0, 0xfffffffffffffffb, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32], 0x20, 0x2}, 0x4000) unshare(0x10000) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$clear(0x7, r4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x54) ioctl$sock_ifreq(r5, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 10:02:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1523.048642][T16549] FAULT_INJECTION: forcing a failure. [ 1523.048642][T16549] name failslab, interval 1, probability 0, space 0, times 0 10:02:38 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) [ 1523.109130][T16556] bond0: (slave bond_slave_1): Releasing backup interface [ 1523.122582][T16549] CPU: 1 PID: 16549 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1523.131719][T16549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.141877][T16549] Call Trace: [ 1523.145184][T16549] dump_stack+0x172/0x1f0 [ 1523.149570][T16549] should_fail.cold+0xa/0x15 [ 1523.154177][T16549] ? fault_create_debugfs_attr+0x180/0x180 [ 1523.159989][T16549] ? ___might_sleep+0x163/0x280 [ 1523.164894][T16549] __should_failslab+0x121/0x190 [ 1523.169822][T16549] should_failslab+0x9/0x14 [ 1523.174318][T16549] __kmalloc_track_caller+0x2dc/0x760 [ 1523.179694][T16549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1523.185939][T16549] ? strndup_user+0x77/0xd0 [ 1523.190458][T16549] memdup_user+0x26/0xb0 [ 1523.194707][T16549] strndup_user+0x77/0xd0 [ 1523.199038][T16549] ksys_mount+0x7b/0x150 [ 1523.203265][T16549] __x64_sys_mount+0xbe/0x150 [ 1523.207929][T16549] do_syscall_64+0xfa/0x760 [ 1523.212432][T16549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.218313][T16549] RIP: 0033:0x45c2ca [ 1523.222188][T16549] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1523.241773][T16549] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1523.250164][T16549] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1523.258117][T16549] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1523.266067][T16549] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1523.274023][T16549] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1523.282070][T16549] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:48 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(0xffffffffffffffff, &(0x7f0000000700), 0x10000000000000ea) 10:02:48 executing program 0 (fault-call:4 fault-nth:55): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:02:48 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000005, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000001040)='/dev/cec#\x00', 0x1, 0x2) bind$inet6(r1, &(0x7f0000001080)={0xa, 0x4e20, 0xfff, @ipv4={[], [], @broadcast}, 0x4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1000, 0x8001, &(0x7f0000001000)={0xa, 0x4e22, 0x80, @mcast1, 0x1000}, 0x1c) 10:02:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1532.997130][T16579] FAULT_INJECTION: forcing a failure. [ 1532.997130][T16579] name failslab, interval 1, probability 0, space 0, times 0 [ 1533.031755][T16579] CPU: 1 PID: 16579 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1533.040935][T16579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.050996][T16579] Call Trace: [ 1533.054293][T16579] dump_stack+0x172/0x1f0 [ 1533.058614][T16579] should_fail.cold+0xa/0x15 [ 1533.063245][T16579] ? fault_create_debugfs_attr+0x180/0x180 [ 1533.069069][T16579] ? ___might_sleep+0x163/0x280 [ 1533.073938][T16579] __should_failslab+0x121/0x190 [ 1533.078888][T16579] should_failslab+0x9/0x14 [ 1533.083387][T16579] __kmalloc+0x2e0/0x770 [ 1533.087622][T16579] ? __kmalloc+0x608/0x770 [ 1533.092020][T16579] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1533.097746][T16579] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1533.103300][T16579] tomoyo_mount_acl+0x149/0x840 [ 1533.108134][T16579] ? __kasan_check_read+0x11/0x20 [ 1533.113139][T16579] ? mark_lock+0xc2/0x1220 [ 1533.117534][T16579] ? lock_downgrade+0x920/0x920 [ 1533.122374][T16579] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1533.127900][T16579] ? __kasan_check_read+0x11/0x20 [ 1533.132912][T16579] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1533.139063][T16579] ? lock_acquire+0x190/0x410 [ 1533.143728][T16579] ? tomoyo_mount_permission+0x10a/0x410 [ 1533.149353][T16579] tomoyo_mount_permission+0x16a/0x410 [ 1533.154785][T16579] ? tomoyo_mount_permission+0x10a/0x410 [ 1533.160396][T16579] ? tomoyo_mount_acl+0x840/0x840 [ 1533.165426][T16579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1533.171666][T16579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1533.177884][T16579] ? strncpy_from_user+0x2b4/0x400 [ 1533.182978][T16579] tomoyo_sb_mount+0x35/0x40 [ 1533.187555][T16579] security_sb_mount+0x87/0xd0 [ 1533.192306][T16579] do_mount+0x1d4/0x1c30 [ 1533.196538][T16579] ? copy_mount_string+0x40/0x40 [ 1533.201462][T16579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1533.207693][T16579] ? _copy_from_user+0x12c/0x1a0 [ 1533.212623][T16579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1533.218841][T16579] ? copy_mount_options+0x2e8/0x3f0 [ 1533.224021][T16579] ksys_mount+0xdb/0x150 [ 1533.228249][T16579] __x64_sys_mount+0xbe/0x150 [ 1533.232907][T16579] do_syscall_64+0xfa/0x760 [ 1533.237413][T16579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.243281][T16579] RIP: 0033:0x45c2ca [ 1533.247154][T16579] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1533.266749][T16579] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1533.275154][T16579] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1533.283113][T16579] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1533.291068][T16579] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1533.299020][T16579] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1533.306974][T16579] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1533.317815][T16579] ERROR: Out of memory at tomoyo_realpath_from_path. 10:02:51 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(r2, &(0x7f0000000700), 0x10000000000000ea) 10:02:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$void(r0, 0xc0045878) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000), 0x10) 10:02:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept(0xffffffffffffffff, 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 10:02:51 executing program 0 (fault-call:4 fault-nth:56): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1535.908965][T16595] FAULT_INJECTION: forcing a failure. [ 1535.908965][T16595] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1535.922198][T16595] CPU: 1 PID: 16595 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1535.931299][T16595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1535.941415][T16595] Call Trace: [ 1535.944723][T16595] dump_stack+0x172/0x1f0 [ 1535.949066][T16595] should_fail.cold+0xa/0x15 [ 1535.953666][T16595] ? fault_create_debugfs_attr+0x180/0x180 [ 1535.959495][T16595] ? perf_trace_lock+0xeb/0x4c0 [ 1535.964358][T16595] ? __kasan_check_read+0x11/0x20 [ 1535.969401][T16595] should_fail_alloc_page+0x50/0x60 [ 1535.974610][T16595] __alloc_pages_nodemask+0x1a1/0x900 [ 1535.979984][T16595] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1535.985629][T16595] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1535.991361][T16595] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1535.997100][T16595] ? fault_create_debugfs_attr+0x180/0x180 [ 1536.002918][T16595] cache_grow_begin+0x90/0xd20 [ 1536.007694][T16595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1536.013937][T16595] kmem_cache_alloc_trace+0x6b3/0x790 [ 1536.019326][T16595] copy_mount_options+0x5c/0x3f0 [ 1536.024270][T16595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1536.030522][T16595] ksys_mount+0xa7/0x150 [ 1536.034777][T16595] __x64_sys_mount+0xbe/0x150 [ 1536.039466][T16595] do_syscall_64+0xfa/0x760 [ 1536.043979][T16595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1536.049873][T16595] RIP: 0033:0x45c2ca [ 1536.053768][T16595] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1536.073367][T16595] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1536.081783][T16595] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1536.089759][T16595] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1536.097727][T16595] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 10:02:51 executing program 4: 10:02:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1536.105695][T16595] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1536.113666][T16595] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:02:51 executing program 2: 10:02:59 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r3}) writev(0xffffffffffffffff, &(0x7f0000000700), 0x10000000000000ea) 10:02:59 executing program 4: 10:02:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:02:59 executing program 2: 10:03:00 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:03:00 executing program 0 (fault-call:4 fault-nth:57): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:00 executing program 2: 10:03:00 executing program 4: [ 1545.110738][T16632] FAULT_INJECTION: forcing a failure. [ 1545.110738][T16632] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.131508][T16632] CPU: 0 PID: 16632 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1545.140650][T16632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1545.150719][T16632] Call Trace: [ 1545.154024][T16632] dump_stack+0x172/0x1f0 10:03:00 executing program 4: r0 = socket$inet6(0xa, 0x100000003, 0x3b) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 1545.158390][T16632] should_fail.cold+0xa/0x15 [ 1545.163013][T16632] ? fault_create_debugfs_attr+0x180/0x180 [ 1545.168857][T16632] ? ___might_sleep+0x163/0x280 [ 1545.173741][T16632] __should_failslab+0x121/0x190 [ 1545.178717][T16632] should_failslab+0x9/0x14 [ 1545.183238][T16632] kmem_cache_alloc+0x2aa/0x710 [ 1545.188108][T16632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1545.194353][T16632] getname_flags+0xd6/0x5b0 [ 1545.194381][T16632] user_path_at_empty+0x2f/0x50 [ 1545.194407][T16632] do_mount+0x150/0x1c30 [ 1545.194435][T16632] ? copy_mount_string+0x40/0x40 [ 1545.212950][T16632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1545.219216][T16632] ? copy_mount_options+0x2e8/0x3f0 [ 1545.224442][T16632] ksys_mount+0xdb/0x150 [ 1545.228713][T16632] __x64_sys_mount+0xbe/0x150 [ 1545.233415][T16632] do_syscall_64+0xfa/0x760 [ 1545.237933][T16632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1545.243810][T16632] RIP: 0033:0x45c2ca [ 1545.247702][T16632] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1545.267297][T16632] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1545.275782][T16632] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1545.283744][T16632] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1545.291710][T16632] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1545.299668][T16632] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 10:03:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 10:03:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1545.307635][T16632] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:03:10 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, 0x0, 0x0) 10:03:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) sendto$packet(r2, &(0x7f0000000340), 0xffffff55, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 10:03:10 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40084146, &(0x7f0000000000)) 10:03:10 executing program 0 (fault-call:4 fault-nth:58): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1554.690732][T16663] device lo entered promiscuous mode [ 1554.733396][T16661] FAULT_INJECTION: forcing a failure. [ 1554.733396][T16661] name failslab, interval 1, probability 0, space 0, times 0 [ 1554.746516][T16661] CPU: 1 PID: 16661 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1554.755654][T16661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1554.765718][T16661] Call Trace: [ 1554.769009][T16661] dump_stack+0x172/0x1f0 [ 1554.773353][T16661] should_fail.cold+0xa/0x15 [ 1554.777954][T16661] ? fault_create_debugfs_attr+0x180/0x180 [ 1554.783967][T16661] ? ___might_sleep+0x163/0x280 [ 1554.788836][T16661] __should_failslab+0x121/0x190 [ 1554.793941][T16661] should_failslab+0x9/0x14 [ 1554.798437][T16661] __kmalloc+0x2e0/0x770 [ 1554.802672][T16661] ? save_stack+0x5c/0x90 [ 1554.807172][T16661] ? save_stack+0x23/0x90 [ 1554.811536][T16661] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1554.816907][T16661] tomoyo_encode2.part.0+0xf5/0x400 [ 1554.822278][T16661] ? do_syscall_64+0xfa/0x760 [ 1554.826950][T16661] tomoyo_encode+0x2b/0x50 [ 1554.831564][T16661] tomoyo_mount_acl+0xe0/0x840 [ 1554.836340][T16661] ? __kasan_check_read+0x11/0x20 [ 1554.841378][T16661] ? mark_lock+0xc2/0x1220 [ 1554.845788][T16661] ? lock_downgrade+0x920/0x920 [ 1554.850992][T16661] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1554.856693][T16661] ? __kasan_check_read+0x11/0x20 [ 1554.861709][T16661] ? __lock_acquire+0x8a0/0x4a00 [ 1554.866648][T16661] ? debug_smp_processor_id+0x3c/0x214 [ 1554.872113][T16661] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1554.878554][T16661] ? lock_acquire+0x190/0x410 [ 1554.883311][T16661] ? tomoyo_mount_permission+0x10a/0x410 [ 1554.888942][T16661] tomoyo_mount_permission+0x16a/0x410 [ 1554.894519][T16661] ? tomoyo_mount_permission+0x10a/0x410 [ 1554.900280][T16661] ? tomoyo_mount_acl+0x840/0x840 [ 1554.905429][T16661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1554.911809][T16661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1554.918055][T16661] ? strncpy_from_user+0x2b4/0x400 [ 1554.923162][T16661] tomoyo_sb_mount+0x35/0x40 [ 1554.927889][T16661] security_sb_mount+0x87/0xd0 [ 1554.932764][T16661] do_mount+0x1d4/0x1c30 [ 1554.937244][T16661] ? copy_mount_string+0x40/0x40 [ 1554.942180][T16661] ? copy_mount_options+0x241/0x3f0 [ 1554.947373][T16661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1554.953608][T16661] ? copy_mount_options+0x2e8/0x3f0 [ 1554.958938][T16661] ksys_mount+0xdb/0x150 [ 1554.963175][T16661] __x64_sys_mount+0xbe/0x150 [ 1554.967851][T16661] do_syscall_64+0xfa/0x760 [ 1554.972356][T16661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1554.978254][T16661] RIP: 0033:0x45c2ca [ 1554.982310][T16661] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1555.001999][T16661] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1555.010521][T16661] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1555.018511][T16661] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1555.026608][T16661] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1555.034702][T16661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1555.042662][T16661] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1555.053190][T16667] device lo left promiscuous mode 10:03:16 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:03:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) chmod(0x0, 0x0) 10:03:16 executing program 0 (fault-call:4 fault-nth:59): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:16 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xde36, 0x100) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000001c0)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x22000, 0x0) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1449) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:03:16 executing program 2: exit(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') splice(r0, 0x0, r2, 0x0, 0x8100000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000001c0)=0x1) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000100)={0x0, 0x0, [], @raw_data=[0x5, 0x3, 0xfff, 0x10000, 0x5, 0x80000000, 0x4, 0x4, 0xe3f1, 0x5, 0xe8cc, 0x0, 0x7, 0x3, 0x3, 0x0, 0x3, 0x5, 0x8, 0xfffffffffffffff7, 0x3, 0x22, 0x5, 0x10001, 0x40, 0x8, 0x10000, 0x401, 0x3, 0xfffffffffffffff8, 0x0, 0x1000]}) ioctl$NBD_SET_SIZE(r4, 0xab02, 0xba) 10:03:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1560.575737][T16682] FAULT_INJECTION: forcing a failure. [ 1560.575737][T16682] name failslab, interval 1, probability 0, space 0, times 0 10:03:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mounts\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x800) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)=0x3) [ 1560.629138][T16682] CPU: 1 PID: 16682 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1560.638303][T16682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1560.648369][T16682] Call Trace: [ 1560.651680][T16682] dump_stack+0x172/0x1f0 [ 1560.656008][T16682] should_fail.cold+0xa/0x15 [ 1560.660597][T16682] ? fault_create_debugfs_attr+0x180/0x180 [ 1560.666399][T16682] ? ___might_sleep+0x163/0x280 [ 1560.671247][T16682] __should_failslab+0x121/0x190 [ 1560.676180][T16682] should_failslab+0x9/0x14 [ 1560.680668][T16682] __kmalloc+0x2e0/0x770 [ 1560.684897][T16682] ? save_stack+0x5c/0x90 [ 1560.689225][T16682] ? save_stack+0x23/0x90 [ 1560.693551][T16682] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1560.698902][T16682] tomoyo_encode2.part.0+0xf5/0x400 [ 1560.704084][T16682] ? do_syscall_64+0xfa/0x760 [ 1560.708746][T16682] tomoyo_encode+0x2b/0x50 [ 1560.713144][T16682] tomoyo_mount_acl+0xe0/0x840 [ 1560.718352][T16682] ? __kasan_check_read+0x11/0x20 [ 1560.723362][T16682] ? mark_lock+0xc2/0x1220 [ 1560.727772][T16682] ? lock_downgrade+0x920/0x920 [ 1560.732609][T16682] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1560.738140][T16682] ? __kasan_check_read+0x11/0x20 [ 1560.743144][T16682] ? __lock_acquire+0x8a0/0x4a00 [ 1560.748060][T16682] ? debug_smp_processor_id+0x3c/0x214 [ 1560.753499][T16682] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1560.759647][T16682] ? lock_acquire+0x190/0x410 [ 1560.764311][T16682] ? tomoyo_mount_permission+0x10a/0x410 [ 1560.769939][T16682] tomoyo_mount_permission+0x16a/0x410 [ 1560.775387][T16682] ? tomoyo_mount_permission+0x10a/0x410 [ 1560.781003][T16682] ? tomoyo_mount_acl+0x840/0x840 [ 1560.786008][T16682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1560.792234][T16682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1560.798458][T16682] ? strncpy_from_user+0x2b4/0x400 [ 1560.803560][T16682] tomoyo_sb_mount+0x35/0x40 [ 1560.808134][T16682] security_sb_mount+0x87/0xd0 [ 1560.812885][T16682] do_mount+0x1d4/0x1c30 [ 1560.817137][T16682] ? copy_mount_string+0x40/0x40 [ 1560.822082][T16682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1560.828309][T16682] ? copy_mount_options+0x2e8/0x3f0 [ 1560.833495][T16682] ksys_mount+0xdb/0x150 [ 1560.837732][T16682] __x64_sys_mount+0xbe/0x150 [ 1560.842399][T16682] do_syscall_64+0xfa/0x760 [ 1560.846894][T16682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1560.852765][T16682] RIP: 0033:0x45c2ca [ 1560.856646][T16682] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1560.876241][T16682] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1560.884632][T16682] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1560.892581][T16682] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1560.900531][T16682] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1560.908482][T16682] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1560.916432][T16682] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1561.125890][T16699] syz-executor.2 (16699): /proc/16699/oom_adj is deprecated, please use /proc/16699/oom_score_adj instead. 10:03:27 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, 0x0, 0x0) 10:03:27 executing program 0 (fault-call:4 fault-nth:60): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='team0\x00') sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYRES32=r0, @ANYRES32=0x0, @ANYBLOB="0000000000000000140003007465616d3000"/28], 0x3}}, 0x10000) 10:03:27 executing program 2: r0 = socket(0x200000000000011, 0x2, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup(r0) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f00000000c0)=""/159, &(0x7f0000000180)=0x9f) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) 10:03:27 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:03:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1572.339436][T16721] FAULT_INJECTION: forcing a failure. [ 1572.339436][T16721] name failslab, interval 1, probability 0, space 0, times 0 [ 1572.363053][T16721] CPU: 1 PID: 16721 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1572.372190][T16721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1572.382255][T16721] Call Trace: [ 1572.385557][T16721] dump_stack+0x172/0x1f0 10:03:28 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000300)={{0x1, 0x1}, {0x0, 0x7f}, 0x75d95a1d, 0x0, 0x1}) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x5, 0x0, 0x80}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x450200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000240)=""/183) ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f0000000200)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) [ 1572.389906][T16721] should_fail.cold+0xa/0x15 [ 1572.394505][T16721] ? fault_create_debugfs_attr+0x180/0x180 [ 1572.400424][T16721] ? ___might_sleep+0x163/0x280 [ 1572.405291][T16721] __should_failslab+0x121/0x190 [ 1572.410244][T16721] should_failslab+0x9/0x14 [ 1572.414751][T16721] __kmalloc+0x2e0/0x770 [ 1572.418988][T16721] ? __kmalloc+0x608/0x770 [ 1572.423413][T16721] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1572.429130][T16721] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1572.434668][T16721] tomoyo_mount_acl+0x149/0x840 [ 1572.439514][T16721] ? __kasan_check_read+0x11/0x20 [ 1572.444535][T16721] ? mark_lock+0xc2/0x1220 [ 1572.448955][T16721] ? lock_downgrade+0x920/0x920 [ 1572.453797][T16721] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1572.459323][T16721] ? __kasan_check_read+0x11/0x20 [ 1572.464352][T16721] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1572.470515][T16721] ? lock_acquire+0x190/0x410 [ 1572.475176][T16721] ? tomoyo_mount_permission+0x10a/0x410 [ 1572.480869][T16721] tomoyo_mount_permission+0x16a/0x410 [ 1572.486347][T16721] ? tomoyo_mount_permission+0x10a/0x410 [ 1572.491978][T16721] ? tomoyo_mount_acl+0x840/0x840 [ 1572.497000][T16721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1572.503355][T16721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1572.509595][T16721] ? strncpy_from_user+0x2b4/0x400 [ 1572.514697][T16721] tomoyo_sb_mount+0x35/0x40 [ 1572.519275][T16721] security_sb_mount+0x87/0xd0 [ 1572.524049][T16721] do_mount+0x1d4/0x1c30 [ 1572.528296][T16721] ? __this_cpu_preempt_check+0x3a/0x210 [ 1572.533923][T16721] ? retint_kernel+0x2b/0x2b [ 1572.538498][T16721] ? copy_mount_string+0x40/0x40 [ 1572.543434][T16721] ? copy_mount_options+0x258/0x3f0 [ 1572.548637][T16721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1572.554870][T16721] ? copy_mount_options+0x2e8/0x3f0 [ 1572.560049][T16721] ksys_mount+0xdb/0x150 [ 1572.564438][T16721] __x64_sys_mount+0xbe/0x150 [ 1572.569166][T16721] do_syscall_64+0xfa/0x760 [ 1572.573770][T16721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1572.579644][T16721] RIP: 0033:0x45c2ca [ 1572.583529][T16721] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1572.603131][T16721] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1572.611550][T16721] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1572.619502][T16721] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1572.627467][T16721] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1572.635437][T16721] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1572.643421][T16721] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1572.652883][T16721] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:28 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) read(r0, &(0x7f0000000040)=""/34, 0x22) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x181001) ioctl(r1, 0xc2604111, &(0x7f0000000040)) 10:03:28 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000180)={0x25, 0x8}) r1 = fcntl$getown(r0, 0x9) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r0, &(0x7f0000000840)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x44c, 0xf, 0x3, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@generic="6105fffa5dd4b8d6c4edf339da325b94767ee6e1a0a80f34dd90482796ac5714ad3ca2a026b3102e5a227d27311694746cc378d2902b5505f011b5501ecbc2d52aef01555c71429494bd32d0111ad3d1d1e51825743e3e75afe135016b746b8f1a6a291cfa7fe5461f02d8d6c7bfe6", @typed={0x14, 0x0, @str='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}, @generic="0ce5f391b01241bb08fe6e3d64f4389e1378206f1fb5f360733e535b92560b1bfb86450702e030d5d559060374b6ff3bf10bf25c42e6d65f400ad90661fe63deb7d067be1c3899715733d605baeb99db56947d1bdf51dfe08a90b7195c684788a2a5dff0e10de5046151aafccec42d6d86b3600c9c52897cb52eaed561dbf0d478e5a5ef77832c471ece71a0bb36a3cfddb40fb41fd5ed4270c7fee3fe79673f733dab7f8e34f69224aad12ae6cea66750e0b08a4f8b4986c3a3d381a520aba41d780adafb1570b8c9b1add41b1ecae4350665d85a8e608b76ea137f08f6ceeb871ffd5c2eb12a52fcd68b", @typed={0x8, 0x71, @pid=r1}, @nested={0x54, 0x22, [@typed={0x8, 0x30, @u32=0xe35}, @generic="b5da2716324c9b8884d160c23fded72c9db3e67493d998023dd04c6b6ada7bccb808f22a5ea3d2f7995bf2b27c2eaa094d19", @typed={0x14, 0x5d, @ipv6=@loopback}]}, @nested={0x68, 0x34, [@generic="4e79e08253a914e86aaaae8914b756bde17de0e6cb3bf0cb9ef9110f66d9923077bfc88a", @typed={0xc, 0x24, @u64=0x7}, @typed={0x8, 0x63, @ipv4=@multicast1}, @typed={0x8, 0x78, @ipv4=@empty}, @generic="f5bee115f9504586db1ae4966dedd95eb8eaeabecdef800bc603", @typed={0x8, 0x67, @uid=r2}]}, @generic="3ce7685876c6de5a88bd5f2fc1d76cfc30a81ee2b474da1493cbfb0b0a69cb53c6d5eb95d5e3ac75852693c8a3ddb095ad7326e59c90ebd1f0861f4b49d312a9bd64c0773e1dc623013c43b178c6730cf7284d1f6c5a69e985367d1c4ddb7fe8e8df0745281da8fa6966e9c0c1ecbbe0c8f11e8ad787268766939a33eb24c0b3d4543715aa16ef647ffa1201e2f57536110e77767fa53f17aeec1ed6ae3c6bf485a534cf1bb937edb7533aecceafa6cbd9eb1d01c31b7907d7ffd26391473d4fac3ef403cc58b4497a03", @nested={0x13c, 0x21, [@generic="9022e1e002108adc31833d4683bad9402793c01e46e818e9a722e55771", @generic, @generic="80ceb685c2cd4201f0ed53db935bb4b64843b2fbf18320439a199b770c969ccc9cf9845d12bf50d33ba3e6c96242a9d0a7b775cc36f13771bb17b69c1f256ef6fb49c9664a48fe5c3acaec31bf97a5", @generic="37cd1f65f2dc8df36b255098ab26ae7827563181bd41f87e484a7b9b0b943c820c0957587abe2726a03db4fb02a8da22db6c4ed971fdf1181942b22fa51c7b5cd77e34df9206a989bc29eccbc2d036edde45b7bc1c8c685daa00fa500501578dc44b746123e0875f3d370cec06a25792cf06a5d7a1d0297dbd159a1e0e2b8406aadcb0ab3084a1ce575ae0ee1ca65e0ea7f478d8027d1219ae4fba41df9cc16255ba9fc59c2debcf98722ffd0911a005122408b4451bf766d7", @typed={0x8, 0x84, @ipv4=@broadcast}, @typed={0x8, 0x38, @fd=r0}]}]}, 0x44c}}, 0x40) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4e, 0x400080) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x3, 0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200)=0x74, 0x4) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) 10:03:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:28 executing program 0 (fault-call:4 fault-nth:61): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1572.982982][T16748] FAULT_INJECTION: forcing a failure. [ 1572.982982][T16748] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1572.996233][T16748] CPU: 0 PID: 16748 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1573.005364][T16748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1573.015437][T16748] Call Trace: [ 1573.018757][T16748] dump_stack+0x172/0x1f0 [ 1573.023124][T16748] should_fail.cold+0xa/0x15 [ 1573.027746][T16748] ? fault_create_debugfs_attr+0x180/0x180 [ 1573.033577][T16748] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1573.039756][T16748] ? putname+0xef/0x130 [ 1573.043944][T16748] should_fail_alloc_page+0x50/0x60 [ 1573.049158][T16748] __alloc_pages_nodemask+0x1a1/0x900 [ 1573.054570][T16748] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1573.060315][T16748] ? fault_create_debugfs_attr+0x180/0x180 [ 1573.066138][T16748] cache_grow_begin+0x90/0xd20 [ 1573.066166][T16748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1573.066195][T16748] __kmalloc+0x6b2/0x770 [ 1573.077180][T16748] ? kmem_cache_alloc+0x364/0x710 [ 1573.077205][T16748] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1573.077239][T16748] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1573.077284][T16748] tomoyo_mount_acl+0x2cc/0x840 [ 1573.102628][T16748] ? mark_lock+0xc2/0x1220 [ 1573.107068][T16748] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1573.112640][T16748] ? __kasan_check_read+0x11/0x20 [ 1573.117696][T16748] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1573.123909][T16748] ? lock_acquire+0x190/0x410 [ 1573.128603][T16748] ? tomoyo_mount_permission+0x10a/0x410 [ 1573.134276][T16748] tomoyo_mount_permission+0x16a/0x410 [ 1573.139746][T16748] ? tomoyo_mount_permission+0x10a/0x410 [ 1573.145405][T16748] ? tomoyo_mount_acl+0x840/0x840 [ 1573.145427][T16748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1573.145465][T16748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1573.162945][T16748] ? strncpy_from_user+0x2b4/0x400 [ 1573.168092][T16748] tomoyo_sb_mount+0x35/0x40 [ 1573.172712][T16748] security_sb_mount+0x87/0xd0 [ 1573.177505][T16748] do_mount+0x1d4/0x1c30 [ 1573.181768][T16748] ? retint_kernel+0x2b/0x2b [ 1573.186392][T16748] ? copy_mount_string+0x40/0x40 [ 1573.191350][T16748] ? copy_mount_options+0x270/0x3f0 [ 1573.196570][T16748] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 1573.202137][T16748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1573.208394][T16748] ? copy_mount_options+0x2e8/0x3f0 [ 1573.213617][T16748] ksys_mount+0xdb/0x150 [ 1573.217866][T16748] __x64_sys_mount+0xbe/0x150 [ 1573.222536][T16748] do_syscall_64+0xfa/0x760 [ 1573.227146][T16748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1573.233034][T16748] RIP: 0033:0x45c2ca [ 1573.236926][T16748] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1573.256565][T16748] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1573.264973][T16748] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1573.272941][T16748] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1573.281060][T16748] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1573.289131][T16748] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1573.297090][T16748] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:03:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000900)='/dev/uhid\x00', 0x805, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE2(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x13e) r2 = dup2(r1, r0) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x10001, 0x4, 0x200, 0x1, 0x0, 0x0, 0x40300, 0xc, 0x80000000, 0xf8, 0x401, 0xc6, 0xfad2, 0x2800, 0x1, 0x6, 0x6, 0x7f, 0x2, 0xff, 0x8, 0x2, 0x9, 0x80000001, 0x7, 0x8, 0x4a86, 0x4, 0x1, 0x37fe, 0x20, 0x1ff, 0xfffffffffffffffe, 0x5, 0xa6, 0x3, 0x0, 0x1f, 0x1, @perf_config_ext={0x8001, 0xf6}, 0x80, 0x0, 0x55, 0x7, 0x5, 0x3f, 0x8000}, r2, 0x2, r2, 0x8) 10:03:36 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x220000, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x100) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x2761, 0x0) fcntl$setflags(r1, 0x2, 0x1) 10:03:36 executing program 0 (fault-call:4 fault-nth:62): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:36 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, 0x0, 0x0) 10:03:36 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1580.596797][T15341] hid-generic 0000:0000:0000.0003: unknown main item tag 0x3 [ 1580.617254][T15341] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max [ 1580.639396][T16767] FAULT_INJECTION: forcing a failure. 10:03:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) r1 = socket$kcm(0x10, 0x5, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e000000110081aee405d10200000e00fa076b000800000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100)={0x4, 0x0, 0x62d}, 0xc) [ 1580.639396][T16767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1580.652626][T16767] CPU: 1 PID: 16767 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1580.661734][T16767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1580.671788][T16767] Call Trace: [ 1580.675095][T16767] dump_stack+0x172/0x1f0 [ 1580.679444][T16767] should_fail.cold+0xa/0x15 [ 1580.684518][T16767] ? fault_create_debugfs_attr+0x180/0x180 [ 1580.690336][T16767] ? perf_trace_lock+0xeb/0x4c0 [ 1580.695189][T16767] ? __kasan_check_read+0x11/0x20 [ 1580.700224][T16767] should_fail_alloc_page+0x50/0x60 [ 1580.705416][T16767] __alloc_pages_nodemask+0x1a1/0x900 [ 1580.710772][T16767] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1580.716385][T16767] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1580.722083][T16767] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1580.727703][T16767] ? fault_create_debugfs_attr+0x180/0x180 [ 1580.733488][T16767] cache_grow_begin+0x90/0xd20 [ 1580.738238][T16767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1580.744458][T16767] kmem_cache_alloc+0x64e/0x710 [ 1580.749296][T16767] getname_kernel+0x53/0x370 [ 1580.753866][T16767] kern_path+0x20/0x40 [ 1580.757915][T16767] tomoyo_mount_acl+0x28c/0x840 [ 1580.762863][T16767] ? mark_lock+0xc2/0x1220 [ 1580.767263][T16767] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1580.772792][T16767] ? __kasan_check_read+0x11/0x20 [ 1580.777815][T16767] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1580.783959][T16767] ? lock_acquire+0x190/0x410 [ 1580.788796][T16767] ? tomoyo_mount_permission+0x10a/0x410 [ 1580.794409][T16767] tomoyo_mount_permission+0x16a/0x410 [ 1580.799843][T16767] ? tomoyo_mount_permission+0x10a/0x410 [ 1580.805452][T16767] ? tomoyo_mount_acl+0x840/0x840 [ 1580.810462][T16767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1580.816708][T16767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1580.822945][T16767] ? strncpy_from_user+0x2b4/0x400 [ 1580.828036][T16767] tomoyo_sb_mount+0x35/0x40 [ 1580.832611][T16767] security_sb_mount+0x87/0xd0 [ 1580.837359][T16767] do_mount+0x1d4/0x1c30 [ 1580.841582][T16767] ? copy_mount_string+0x40/0x40 [ 1580.846504][T16767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1580.852723][T16767] ? copy_mount_options+0x2e8/0x3f0 [ 1580.857901][T16767] ksys_mount+0xdb/0x150 [ 1580.862130][T16767] __x64_sys_mount+0xbe/0x150 [ 1580.866796][T16767] do_syscall_64+0xfa/0x760 [ 1580.871300][T16767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1580.877170][T16767] RIP: 0033:0x45c2ca [ 1580.881048][T16767] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1580.900629][T16767] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1580.909016][T16767] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1580.916964][T16767] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1580.924912][T16767] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1580.932861][T16767] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 10:03:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1580.940835][T16767] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1580.953139][T15341] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max [ 1580.971031][T15341] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.01 Device [syz0] on ˆz1 10:03:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setresuid(0x0, 0xfffe, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 10:03:36 executing program 0 (fault-call:4 fault-nth:63): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:36 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x480780, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x23b44) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000040)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000100)={0x3}) 10:03:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1581.363802][T16798] FAULT_INJECTION: forcing a failure. [ 1581.363802][T16798] name failslab, interval 1, probability 0, space 0, times 0 10:03:37 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) exit(0x0) [ 1581.414897][T16798] CPU: 1 PID: 16798 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1581.424046][T16798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1581.434106][T16798] Call Trace: [ 1581.437417][T16798] dump_stack+0x172/0x1f0 [ 1581.441765][T16798] should_fail.cold+0xa/0x15 [ 1581.446436][T16798] ? fault_create_debugfs_attr+0x180/0x180 [ 1581.458771][T16798] ? ___might_sleep+0x163/0x280 [ 1581.463635][T16798] __should_failslab+0x121/0x190 [ 1581.468589][T16798] should_failslab+0x9/0x14 [ 1581.473098][T16798] kmem_cache_alloc+0x2aa/0x710 [ 1581.477960][T16798] ? __kasan_check_write+0x14/0x20 [ 1581.483082][T16798] getname_kernel+0x53/0x370 [ 1581.487667][T16798] kern_path+0x20/0x40 [ 1581.491717][T16798] tomoyo_mount_acl+0x28c/0x840 [ 1581.496552][T16798] ? mark_lock+0xc2/0x1220 [ 1581.501046][T16798] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1581.506578][T16798] ? __kasan_check_read+0x11/0x20 [ 1581.511595][T16798] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1581.517741][T16798] ? lock_acquire+0x190/0x410 [ 1581.522393][T16798] ? tomoyo_mount_permission+0x10a/0x410 [ 1581.528008][T16798] tomoyo_mount_permission+0x16a/0x410 [ 1581.533443][T16798] ? tomoyo_mount_permission+0x10a/0x410 [ 1581.539051][T16798] ? tomoyo_mount_acl+0x840/0x840 [ 1581.544058][T16798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1581.550283][T16798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1581.556529][T16798] ? strncpy_from_user+0x2b4/0x400 [ 1581.561628][T16798] tomoyo_sb_mount+0x35/0x40 [ 1581.566208][T16798] security_sb_mount+0x87/0xd0 [ 1581.570952][T16798] do_mount+0x1d4/0x1c30 [ 1581.575173][T16798] ? retint_kernel+0x2b/0x2b [ 1581.579741][T16798] ? copy_mount_string+0x40/0x40 [ 1581.584668][T16798] ? copy_mount_options+0x270/0x3f0 [ 1581.589855][T16798] ? copy_mount_options+0x200/0x3f0 [ 1581.595032][T16798] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 1581.600555][T16798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1581.606772][T16798] ? copy_mount_options+0x2e8/0x3f0 [ 1581.611947][T16798] ksys_mount+0xdb/0x150 [ 1581.616172][T16798] __x64_sys_mount+0xbe/0x150 [ 1581.620858][T16798] do_syscall_64+0xfa/0x760 [ 1581.625373][T16798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1581.631252][T16798] RIP: 0033:0x45c2ca [ 1581.635124][T16798] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1581.654706][T16798] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1581.663095][T16798] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1581.671048][T16798] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1581.678995][T16798] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1581.686950][T16798] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1581.694909][T16798] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:03:43 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:03:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') writev(r0, &(0x7f0000000500)=[{&(0x7f00000001c0)="89", 0x1}], 0x1) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x501000) 10:03:43 executing program 0 (fault-call:4 fault-nth:64): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:43 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = getpgrp(0xffffffffffffffff) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)="c408aa94", 0x4, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="43231743d68f5293f2d99d3d35d0d0d7c86cc192fc00f8b266f8760d45de016aa2b2713260cc5961585dc193e5aea06a655ea983dc8ab9c441de21d1969d6d759377088f9502d0cd33a189897fb6c84507797771368a8a7ef9fbb11a4d2cad641aeb40811058aba03309425334e197b9757faa9cc52a03b97565b872c7c71f9613869f165e7470", 0x87, 0xfffffffffffffffb) keyctl$reject(0x13, r2, 0x7, 0x1d, r3) r4 = syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/user\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r4) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f00000000c0)=0x1, 0x4) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x800, 0x0) ioctl$BINDER_SET_MAX_THREADS(r5, 0x40046205, &(0x7f0000000180)=0x2) getsockopt$inet_tcp_buf(r7, 0x6, 0x1a, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) 10:03:43 executing program 1 (fault-call:10 fault-nth:0): sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1587.769120][T16828] FAULT_INJECTION: forcing a failure. [ 1587.769120][T16828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1587.782382][T16828] CPU: 0 PID: 16828 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1587.791514][T16828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.801598][T16828] Call Trace: [ 1587.804924][T16828] dump_stack+0x172/0x1f0 [ 1587.809289][T16828] should_fail.cold+0xa/0x15 [ 1587.813995][T16828] ? fault_create_debugfs_attr+0x180/0x180 [ 1587.819824][T16828] ? perf_trace_lock+0x315/0x4c0 [ 1587.824789][T16828] ? __kasan_check_read+0x11/0x20 [ 1587.829843][T16828] should_fail_alloc_page+0x50/0x60 [ 1587.835054][T16828] __alloc_pages_nodemask+0x1a1/0x900 [ 1587.840443][T16828] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1587.846103][T16828] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1587.851834][T16828] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1587.857675][T16828] ? fault_create_debugfs_attr+0x180/0x180 [ 1587.863509][T16828] cache_grow_begin+0x90/0xd20 10:03:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x6000, 0xffffffffffffffff) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x48080) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x4, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5782}}, {@max_read={'max_read', 0x3d, 0x100000000}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1ff}}, {@max_read={'max_read', 0x3d, 0x51e}}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'system.posix_acl_access\x00'}}, {@subj_role={'subj_role', 0x3d, 'nodev}vmnet1+'}}, {@euid_lt={'euid<', r4}}]}}) setxattr$system_posix_acl(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)='system.posix_acl_access\x00', &(0x7f00000042c0)={{}, {}, [], {}, [{}, {}, {0x8, 0x2}, {}, {}, {}, {}]}, 0x5c, 0x0) 10:03:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1587.868292][T16828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1587.874559][T16828] kmem_cache_alloc+0x64e/0x710 [ 1587.879450][T16828] getname_kernel+0x53/0x370 [ 1587.884062][T16828] kern_path+0x20/0x40 [ 1587.888146][T16828] tomoyo_mount_acl+0x28c/0x840 [ 1587.893024][T16828] ? mark_lock+0xc2/0x1220 [ 1587.897446][T16828] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1587.902993][T16828] ? __kasan_check_read+0x11/0x20 [ 1587.903025][T16828] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1587.903084][T16828] ? lock_acquire+0x190/0x410 [ 1587.903101][T16828] ? tomoyo_mount_permission+0x10a/0x410 [ 1587.903134][T16828] tomoyo_mount_permission+0x16a/0x410 [ 1587.903148][T16828] ? tomoyo_mount_permission+0x10a/0x410 [ 1587.903166][T16828] ? tomoyo_mount_acl+0x840/0x840 [ 1587.903184][T16828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1587.903221][T16828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1587.903242][T16828] ? strncpy_from_user+0x2b4/0x400 [ 1587.958369][T16828] tomoyo_sb_mount+0x35/0x40 [ 1587.962986][T16828] security_sb_mount+0x87/0xd0 [ 1587.967783][T16828] do_mount+0x1d4/0x1c30 [ 1587.972044][T16828] ? copy_mount_string+0x40/0x40 [ 1587.976993][T16828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.977011][T16828] ? copy_mount_options+0x2e8/0x3f0 [ 1587.977038][T16828] ksys_mount+0xdb/0x150 [ 1587.977063][T16828] __x64_sys_mount+0xbe/0x150 [ 1587.977092][T16828] do_syscall_64+0xfa/0x760 [ 1587.977118][T16828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1587.977138][T16828] RIP: 0033:0x45c2ca [ 1588.011715][T16828] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1588.031335][T16828] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1588.039766][T16828] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1588.047752][T16828] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1588.055737][T16828] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 10:03:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[]}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x1a000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ifb0\x00', 0x1}, 0x18) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x6, 0x50000) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x10003, 0x7, 0xc4, 0x40, r1, 0x7, [], 0x0, r2}, 0x28) r3 = socket(0x10, 0x80002, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000002c0)=@gcm_256={{0x303}, "d2e12c307e64f89f", "c181915d58c4d781bc78b8eeb4ffe4e37191904982bcf8ae0328d5c1f30e1b2d", "e4efb884", "5f54a1ae26abcf26"}, 0x38) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0xfc, "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"}, &(0x7f0000000440)=0x104) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={r4, 0x7fff}, &(0x7f00000004c0)=0x8) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000017010000040000000000000000000000180000000000000017010000030000002665ae37000000001800000000000000170100000300000001100000000000003800000000000000170100000200000022000000ee33625040de2dd5b7eadfdb9aa448e38939aae8e979b55d2ae608be27dce4b0dab60000"], 0x80}], 0x1, 0x4) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20002, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) ptrace$cont(0x18, r6, 0x7, 0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000100)={0xffffffffffffffc5, &(0x7f0000000500)=""/179}) ioctl$UI_DEV_DESTROY(r2, 0x5502) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000005c0)=@assoc_value, &(0x7f0000000680)=0x8) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x1e, 0x5}, 0x2) [ 1588.063755][T16828] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1588.071765][T16828] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:03:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:43 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) getpid() prctl$PR_GET_NAME(0x10, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7ff, 0x80) rt_sigqueueinfo(0x0, 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x8) mount(0x0, 0x0, &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) modify_ldt$read(0x0, 0x0, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0xa}) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000001480)=0x1) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000001400), &(0x7f0000001440)=0x4) vmsplice(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="b8469da53b0e0ec22b1497662b5b5d4b647bd5e2c98733b402ea97036f95abe71c8458e43769f9", 0x27}, {&(0x7f0000000200)="426ed8fea6faa516a0782770ef042e82e65f424dde057f606f4cd08e62f89c165a72af1d99ac0a332eabfd2483edfa93d18940f6442a90b2e914ca99266ff925fbf389ffac3df88e46dc730e26fcf4010633672c2d61e9feab354c94df12e3657e7a63ab9aae96c766b950992ac345fd7059e66042851f11e9c0bed9089fdb1c444a36d5d917fe795b7bfe5c7484d49be6c71385136113939bbf5dfa6af30a9b5a6ef8ea8ef702b4317aac1fd9be6578eec13a5faf5b35e8caf1cf743c952ecc03828d6bbdcc21ce8e76518963e44d5c939f1aed70f0ed51c2f9c8827d5ea08b20a7501366c048a61a46d7c83d45109e5255f7", 0xf3}, {&(0x7f0000000300)="695a7e5b3c7e76cbcebcf6a19afd74f0a861e4998d8be4eba8d61a0b30dcc63fd45e2523f032e6d61b07902634c337a53af4a345624c136178071f16d4133a8e0e1497369a402ea560bb19ea9c5c6d08e66a10c52e261da577ff2f57e3f2eca5d19c6a0040", 0x65}, {&(0x7f0000000140)="cb859170253b3e33ae609bef14afec8a9841e810bcd194a0", 0x18}, {&(0x7f0000000380)="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", 0x1000}], 0x5, 0x2) 10:03:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:50 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:03:50 executing program 0 (fault-call:4 fault-nth:65): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:50 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000240)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) shutdown(r0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) 10:03:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:50 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0xffffff5f, 0x2) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) [ 1594.896402][T16873] FAULT_INJECTION: forcing a failure. [ 1594.896402][T16873] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1594.909674][T16873] CPU: 0 PID: 16873 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1594.918798][T16873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.928914][T16873] Call Trace: [ 1594.932224][T16873] dump_stack+0x172/0x1f0 [ 1594.936565][T16873] should_fail.cold+0xa/0x15 [ 1594.936593][T16873] ? fault_create_debugfs_attr+0x180/0x180 [ 1594.936618][T16873] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1594.936638][T16873] ? putname+0xef/0x130 [ 1594.936670][T16873] should_fail_alloc_page+0x50/0x60 [ 1594.936684][T16873] __alloc_pages_nodemask+0x1a1/0x900 [ 1594.936709][T16873] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1594.936744][T16873] ? fault_create_debugfs_attr+0x180/0x180 [ 1594.936773][T16873] cache_grow_begin+0x90/0xd20 [ 1594.936799][T16873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1594.936823][T16873] __kmalloc+0x6b2/0x770 [ 1594.936844][T16873] ? kmem_cache_alloc+0x364/0x710 [ 1594.936865][T16873] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1594.936893][T16873] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1594.936928][T16873] tomoyo_mount_acl+0x2cc/0x840 [ 1594.936959][T16873] ? mark_lock+0xc2/0x1220 [ 1594.936977][T16873] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1594.936997][T16873] ? __kasan_check_read+0x11/0x20 [ 1594.937025][T16873] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1594.937079][T16873] ? lock_acquire+0x190/0x410 [ 1594.937095][T16873] ? tomoyo_mount_permission+0x10a/0x410 [ 1594.937125][T16873] tomoyo_mount_permission+0x16a/0x410 [ 1595.052873][T16873] ? tomoyo_mount_permission+0x10a/0x410 [ 1595.058494][T16873] ? tomoyo_mount_acl+0x840/0x840 [ 1595.063524][T16873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1595.069774][T16873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1595.076008][T16873] ? strncpy_from_user+0x2b4/0x400 [ 1595.081109][T16873] tomoyo_sb_mount+0x35/0x40 [ 1595.085700][T16873] security_sb_mount+0x87/0xd0 [ 1595.090462][T16873] do_mount+0x1d4/0x1c30 [ 1595.094715][T16873] ? copy_mount_string+0x40/0x40 [ 1595.099659][T16873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.105896][T16873] ? copy_mount_options+0x2e8/0x3f0 [ 1595.111097][T16873] ksys_mount+0xdb/0x150 [ 1595.115328][T16873] __x64_sys_mount+0xbe/0x150 [ 1595.120000][T16873] do_syscall_64+0xfa/0x760 [ 1595.124496][T16873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1595.130381][T16873] RIP: 0033:0x45c2ca [ 1595.134275][T16873] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1595.153867][T16873] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1595.162263][T16873] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1595.170222][T16873] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1595.178191][T16873] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1595.186160][T16873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1595.194117][T16873] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:03:52 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:03:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:03:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000540000000000000004000000010000000800000000000000050000000000000001000000000000000800000000000000000000000000000000000000000000000b00000000000000000000000000000090060000000000001f8200000000000000080000000000000000000000000000000000000000000001220000000000000000000000000000496400000000000009060000000000001a0000000000000000000000000000000000000000000000042a00000000000000000000000000003f0000000000000005000064b53dba3bccf400000000000300"/240]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r2}}, 0x48) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000003c0)={0x2710, 0x3, 0x3000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) pread64(r1, &(0x7f00000004c0)=""/232, 0xe8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000700)={@empty, 0x76, r4}) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f00000001c0)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000840)={0x0, 0x93, "5d4e0e0878a702371e35cd7a4a75794390c4e28b61e24179f85ecbbb03164a0bf13dda6878f8af7cce43eb2dfb094cafe5c87173eae2f8f323c41755bade4f35acabdadc83146aa1292e8126f8c1a7209876aa7cf840521cce36903939fbd8099c0ded7dfbb93685d87f02cf973bf6c515381f0e88f830d873086b2b7546330c3b1802594d6a8e07c33b2f8366805c1472b0fe"}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffff8) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000240), 0x10) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000a00)={0x3, 0x1, @raw_data=[0x0, 0xfffffffffffffff8, 0x9, 0xfffffffffffffffc, 0x7fffffff, 0x101, 0xe390, 0x101, 0x0, 0x7, 0x8, 0x9ec, 0x0, 0x9, 0x0, 0x6]}) 10:03:52 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) bind$can_raw(r0, &(0x7f00000001c0), 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="e1affde3", 0x4) recvmmsg(r1, &(0x7f0000000e00)=[{{&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, &(0x7f0000000200)=""/174, 0xae}, 0xed}, {{&(0x7f0000000140)=@nl=@proc, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/130, 0x82}, {&(0x7f0000000380)=""/11, 0xb}], 0x2, &(0x7f0000000400)=""/108, 0x6c}, 0x100}, {{&(0x7f0000000480), 0x80, &(0x7f0000000600)=[{&(0x7f0000000500)=""/219, 0xdb}], 0x1, &(0x7f0000000640)=""/48, 0x30}, 0x6}, {{&(0x7f0000000680)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000700)=""/119, 0x77}, {&(0x7f0000000780)=""/81, 0x51}, {&(0x7f0000000800)=""/50, 0x32}], 0x3}, 0x7fff}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/31, 0x1f}, {&(0x7f00000008c0)=""/238, 0xee}, {&(0x7f00000009c0)=""/211, 0xd3}, {&(0x7f0000000ac0)=""/137, 0x89}, {&(0x7f0000000b80)=""/158, 0x9e}, {&(0x7f0000000c40)=""/231, 0xe7}, {&(0x7f0000000d40)=""/27, 0x1b}], 0x7}, 0x75}], 0x5, 0x40, &(0x7f0000000f40)={0x0, 0x1c9c380}) sendmsg$can_raw(r0, &(0x7f0000001080)={&(0x7f0000000f80)={0x1d, r2}, 0x10, &(0x7f0000001040)={&(0x7f0000000fc0)=@canfd={{0x2, 0x1ff, 0x4, 0x2}, 0x19, 0x3, 0x0, 0x0, "d6c9164cfc10b5a47245ce83246b62480bba35eef4e328a7fd75748f13f0a945adbd36cb68da60a4ee9ea3f751c0f4050b5dca021c425cbbb9a0db2b0b5aea58"}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 10:03:52 executing program 0 (fault-call:4 fault-nth:66): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:03:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4f4a62ce3fdf619d, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x32d) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x80) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') lsetxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', 0xffffffffffffffff, 0x0, 0x2) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r2, @ANYBLOB="04042bbd7000fedbdf250a000000340001000800090058000000080001000a0000000c000700300000002c00000014000300000000000000000000000000000000003800030008000100030000000800050000000015080007004e24000014000600ff01000000000000000000000000000108000800dc00000008000400c1060000080005000700000008000500010000001c000200080005008100000028000b0002000000080002004e230000e7c3e560556c9d7762939bb671ecec5285340c134dcd156a2ec2f14dcf1803d6a621a051cdf659"], 0xb4}, 0x1, 0x0, 0x0, 0x40}, 0x36a4a5113cf9d3e8) ioctl$KDENABIO(r1, 0x4b36) [ 1596.978268][T16890] FAULT_INJECTION: forcing a failure. [ 1596.978268][T16890] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.032717][T16890] CPU: 0 PID: 16890 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1597.041914][T16890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1597.051983][T16890] Call Trace: [ 1597.055298][T16890] dump_stack+0x172/0x1f0 [ 1597.059664][T16890] should_fail.cold+0xa/0x15 [ 1597.064282][T16890] ? fault_create_debugfs_attr+0x180/0x180 [ 1597.070121][T16890] ? ___might_sleep+0x163/0x280 [ 1597.074999][T16890] __should_failslab+0x121/0x190 10:03:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1597.079963][T16890] should_failslab+0x9/0x14 [ 1597.084481][T16890] __kmalloc_track_caller+0x2dc/0x760 [ 1597.089867][T16890] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1597.095436][T16890] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1597.101436][T16890] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1597.107261][T16890] ? vfs_parse_fs_string+0xe8/0x170 [ 1597.112468][T16890] kmemdup_nul+0x31/0xa0 [ 1597.116719][T16890] vfs_parse_fs_string+0xe8/0x170 [ 1597.121764][T16890] ? vfs_parse_fs_param+0x540/0x540 [ 1597.126987][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.133240][T16890] ? alloc_fs_context+0x434/0x6d0 [ 1597.138302][T16890] vfs_kern_mount.part.0+0x73/0xf0 [ 1597.143417][T16890] vfs_kern_mount+0x40/0x60 [ 1597.143447][T16890] btrfs_mount+0x2b4/0x15d8 [ 1597.143468][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.143489][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.143508][T16890] ? debug_smp_processor_id+0x3c/0x214 [ 1597.143535][T16890] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1597.165013][T16890] ? btrfs_remount+0x10f0/0x10f0 [ 1597.165048][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.165070][T16890] ? refcount_sub_and_test_checked+0x154/0x200 [ 1597.165091][T16890] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1597.165118][T16890] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1597.165136][T16890] ? __lookup_constant+0xd6/0x100 [ 1597.165163][T16890] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1597.216359][T16890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1597.222620][T16890] ? apparmor_capable+0x2ed/0x630 [ 1597.227655][T16890] ? cap_capable+0x205/0x270 [ 1597.232258][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.238520][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.244786][T16890] ? btrfs_remount+0x10f0/0x10f0 [ 1597.249741][T16890] legacy_get_tree+0x113/0x220 [ 1597.254520][T16890] ? legacy_get_tree+0x113/0x220 [ 1597.259469][T16890] ? ns_capable_common+0x93/0x100 [ 1597.264520][T16890] vfs_get_tree+0x8f/0x380 [ 1597.268960][T16890] do_mount+0x13b3/0x1c30 [ 1597.273312][T16890] ? copy_mount_string+0x40/0x40 [ 1597.278280][T16890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.284532][T16890] ? copy_mount_options+0x2e8/0x3f0 [ 1597.289748][T16890] ksys_mount+0xdb/0x150 [ 1597.294005][T16890] __x64_sys_mount+0xbe/0x150 [ 1597.298706][T16890] do_syscall_64+0xfa/0x760 [ 1597.303232][T16890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1597.309134][T16890] RIP: 0033:0x45c2ca [ 1597.313045][T16890] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1597.332646][T16890] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1597.332666][T16890] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1597.332677][T16890] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1597.332689][T16890] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1597.332699][T16890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1597.332711][T16890] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:01 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000001940)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{}, {}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66060000002c6c6f7765726469723d2e2f66696c810e50044e132f65302c776f726b6469723d2e2f66696c65315c00"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000400), &(0x7f0000000200)=0x5455ae3099be40ff) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f0000000280)="5e182cd81255064ae89bae7e68896be18a2c54e7228fb0093006806273b396a5e869a4711ca802a94447746949545e1bb7fa97ab74a1d53d4c94db70f00808b5a2a548c3705b60fc7251ba145e836a5b0fffc4defaaddb6fa06ff3678a3626db2487f539c1ca0f03756087302452cb850c7eb638a94c4c346ef79e552e62ebc94d8913389258ce8e643af7781afc541601a98c41bc9173e00ed7c07a85e953709155a6", 0xa3) utime(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x9cf, 0x9}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 10:04:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000004300)='/dev/loop#\x00', 0xffffffffffff0000, 0x1100082) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 10:04:01 executing program 0 (fault-call:4 fault-nth:67): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:01 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x10001, 0x9, 0x7, 0x0, 0x3}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r4, 0x4, 0xb, "b5609ae555774de0f05442"}, 0x13) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$KDMKTONE(r0, 0x4b30, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r5}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) [ 1606.166019][T16924] FAULT_INJECTION: forcing a failure. [ 1606.166019][T16924] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.178854][T16926] overlayfs: missing 'lowerdir' [ 1606.206627][T16924] CPU: 0 PID: 16924 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1606.215776][T16924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.225844][T16924] Call Trace: [ 1606.229159][T16924] dump_stack+0x172/0x1f0 [ 1606.233527][T16924] should_fail.cold+0xa/0x15 [ 1606.238143][T16924] ? fault_create_debugfs_attr+0x180/0x180 [ 1606.243976][T16924] ? ___might_sleep+0x163/0x280 [ 1606.248844][T16924] __should_failslab+0x121/0x190 10:04:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1606.253796][T16924] should_failslab+0x9/0x14 [ 1606.254127][T16926] overlayfs: missing 'lowerdir' [ 1606.258303][T16924] kmem_cache_alloc_trace+0x2d3/0x790 [ 1606.258341][T16924] alloc_fs_context+0x5a/0x6d0 [ 1606.273353][T16924] fs_context_for_mount+0x25/0x30 [ 1606.278387][T16924] do_mount+0x132d/0x1c30 [ 1606.282732][T16924] ? __this_cpu_preempt_check+0x3a/0x210 [ 1606.288391][T16924] ? copy_mount_string+0x40/0x40 [ 1606.293361][T16924] ? copy_mount_options+0x204/0x3f0 [ 1606.298570][T16924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.304804][T16924] ? copy_mount_options+0x2e8/0x3f0 [ 1606.304834][T16924] ksys_mount+0xdb/0x150 [ 1606.304862][T16924] __x64_sys_mount+0xbe/0x150 [ 1606.318959][T16924] do_syscall_64+0xfa/0x760 [ 1606.323486][T16924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1606.329389][T16924] RIP: 0033:0x45c2ca [ 1606.333305][T16924] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 10:04:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:02 executing program 2: 10:04:02 executing program 4: [ 1606.353009][T16924] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1606.361437][T16924] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1606.369422][T16924] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1606.377408][T16924] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1606.385398][T16924] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1606.393381][T16924] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:02 executing program 0 (fault-call:4 fault-nth:68): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1606.694157][T16952] FAULT_INJECTION: forcing a failure. [ 1606.694157][T16952] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.719320][T16952] CPU: 0 PID: 16952 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1606.728512][T16952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.738581][T16952] Call Trace: [ 1606.741901][T16952] dump_stack+0x172/0x1f0 [ 1606.746276][T16952] should_fail.cold+0xa/0x15 [ 1606.750896][T16952] ? fault_create_debugfs_attr+0x180/0x180 [ 1606.756729][T16952] ? ___might_sleep+0x163/0x280 [ 1606.761588][T16952] __should_failslab+0x121/0x190 [ 1606.766511][T16952] should_failslab+0x9/0x14 [ 1606.770991][T16952] kmem_cache_alloc_trace+0x2d3/0x790 [ 1606.776356][T16952] alloc_fs_context+0x5a/0x6d0 [ 1606.781107][T16952] fs_context_for_mount+0x25/0x30 [ 1606.786116][T16952] do_mount+0x132d/0x1c30 [ 1606.790431][T16952] ? copy_mount_string+0x40/0x40 [ 1606.795360][T16952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.801581][T16952] ? copy_mount_options+0x2e8/0x3f0 [ 1606.806765][T16952] ksys_mount+0xdb/0x150 [ 1606.810989][T16952] __x64_sys_mount+0xbe/0x150 [ 1606.815650][T16952] do_syscall_64+0xfa/0x760 [ 1606.820145][T16952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1606.826024][T16952] RIP: 0033:0x45c2ca [ 1606.829901][T16952] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1606.849485][T16952] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1606.857879][T16952] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1606.865829][T16952] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1606.873786][T16952] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1606.881744][T16952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1606.889697][T16952] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:08 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000001940)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:08 executing program 2: 10:04:08 executing program 4: 10:04:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:08 executing program 0 (fault-call:4 fault-nth:69): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1613.285992][T16966] FAULT_INJECTION: forcing a failure. [ 1613.285992][T16966] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1613.299230][T16966] CPU: 1 PID: 16966 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1613.308336][T16966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.318411][T16966] Call Trace: [ 1613.321717][T16966] dump_stack+0x172/0x1f0 [ 1613.326063][T16966] should_fail.cold+0xa/0x15 [ 1613.330678][T16966] ? fault_create_debugfs_attr+0x180/0x180 [ 1613.336487][T16966] ? perf_trace_lock+0xeb/0x4c0 [ 1613.341333][T16966] ? __kasan_check_read+0x11/0x20 [ 1613.346344][T16966] should_fail_alloc_page+0x50/0x60 [ 1613.351522][T16966] __alloc_pages_nodemask+0x1a1/0x900 [ 1613.356893][T16966] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1613.362519][T16966] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1613.368222][T16966] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1613.373839][T16966] ? fault_create_debugfs_attr+0x180/0x180 [ 1613.379621][T16966] cache_grow_begin+0x90/0xd20 [ 1613.384375][T16966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1613.390597][T16966] kmem_cache_alloc_node_trace+0x689/0x750 [ 1613.396380][T16966] ? vfs_get_tree+0x8f/0x380 [ 1613.400948][T16966] ? do_mount+0x13b3/0x1c30 [ 1613.405433][T16966] __kmalloc_node+0x3d/0x70 [ 1613.409921][T16966] kvmalloc_node+0xbd/0x100 [ 1613.414424][T16966] btrfs_mount_root+0x12b/0x1290 [ 1613.419357][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.425576][T16966] ? btrfs_decode_error+0x70/0x70 [ 1613.430576][T16966] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1613.436723][T16966] ? vfs_parse_fs_string+0x111/0x170 [ 1613.441985][T16966] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1613.447505][T16966] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1613.453469][T16966] ? __lookup_constant+0xd6/0x100 [ 1613.458475][T16966] ? security_fs_context_parse_param+0x81/0xb0 [ 1613.464603][T16966] ? logfc+0x700/0x700 [ 1613.468651][T16966] ? kfree+0x28b/0x2c0 [ 1613.472699][T16966] ? vfs_parse_fs_string+0x116/0x170 [ 1613.477961][T16966] ? btrfs_decode_error+0x70/0x70 [ 1613.482964][T16966] legacy_get_tree+0x113/0x220 [ 1613.487707][T16966] vfs_get_tree+0x8f/0x380 [ 1613.492102][T16966] fc_mount+0x17/0xc0 [ 1613.496060][T16966] vfs_kern_mount.part.0+0xd8/0xf0 [ 1613.501149][T16966] vfs_kern_mount+0x40/0x60 [ 1613.505633][T16966] btrfs_mount+0x2b4/0x15d8 [ 1613.510115][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.516332][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.522551][T16966] ? debug_smp_processor_id+0x3c/0x214 [ 1613.527988][T16966] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1613.534120][T16966] ? btrfs_remount+0x10f0/0x10f0 [ 1613.539033][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.545255][T16966] ? refcount_sub_and_test_checked+0x154/0x200 [ 1613.551393][T16966] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1613.556759][T16966] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1613.562722][T16966] ? __lookup_constant+0xd6/0x100 [ 1613.567733][T16966] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1613.573747][T16966] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1613.579981][T16966] ? apparmor_capable+0x2ed/0x630 [ 1613.584984][T16966] ? cap_capable+0x205/0x270 [ 1613.589553][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.595776][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.601996][T16966] ? btrfs_remount+0x10f0/0x10f0 [ 1613.606917][T16966] legacy_get_tree+0x113/0x220 [ 1613.611657][T16966] ? legacy_get_tree+0x113/0x220 [ 1613.616578][T16966] ? ns_capable_common+0x93/0x100 [ 1613.621583][T16966] vfs_get_tree+0x8f/0x380 [ 1613.625978][T16966] do_mount+0x13b3/0x1c30 [ 1613.630287][T16966] ? copy_mount_string+0x40/0x40 [ 1613.635408][T16966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1613.641625][T16966] ? copy_mount_options+0x2e8/0x3f0 [ 1613.646800][T16966] ksys_mount+0xdb/0x150 [ 1613.651022][T16966] __x64_sys_mount+0xbe/0x150 [ 1613.655677][T16966] do_syscall_64+0xfa/0x760 [ 1613.660162][T16966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1613.666030][T16966] RIP: 0033:0x45c2ca [ 1613.669903][T16966] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1613.689483][T16966] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1613.697871][T16966] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1613.705825][T16966] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1613.713776][T16966] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1613.721725][T16966] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1613.729674][T16966] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:17 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x501800, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0, 0xffffffffffffffe2}}, 0x4004010) r1 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r2 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r5}) writev(r4, &(0x7f0000000700), 0x10000000000000ea) 10:04:17 executing program 2: 10:04:17 executing program 4: 10:04:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:17 executing program 0 (fault-call:4 fault-nth:70): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:17 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x20008010) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x22, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000180)) creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x10000, 0x0, 0x1000f4) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x401000000801, 0x0) close(r5) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r5, r6, 0x0, 0x8000fffffffe) ioctl$int_in(r5, 0x5421, &(0x7f0000000000)=0x9) ioctl$ASHMEM_SET_PROT_MASK(r6, 0x40087705, &(0x7f00000000c0)={0x8, 0x680}) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0xc, 0x1, 0xd8, 0x0}, 0x20) openat$cgroup_int(r3, 0x0, 0x2, 0x0) 10:04:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1621.717372][T16985] FAULT_INJECTION: forcing a failure. [ 1621.717372][T16985] name failslab, interval 1, probability 0, space 0, times 0 [ 1621.810373][T16985] CPU: 0 PID: 16985 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1621.819525][T16985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.829589][T16985] Call Trace: [ 1621.832913][T16985] dump_stack+0x172/0x1f0 [ 1621.837282][T16985] should_fail.cold+0xa/0x15 [ 1621.841903][T16985] ? fault_create_debugfs_attr+0x180/0x180 [ 1621.847745][T16985] ? ___might_sleep+0x163/0x280 [ 1621.852630][T16985] __should_failslab+0x121/0x190 [ 1621.857603][T16985] should_failslab+0x9/0x14 [ 1621.862115][T16985] __kmalloc_track_caller+0x2dc/0x760 [ 1621.867495][T16985] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1621.873062][T16985] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1621.879059][T16985] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1621.884884][T16985] ? vfs_parse_fs_string+0xe8/0x170 [ 1621.890109][T16985] kmemdup_nul+0x31/0xa0 [ 1621.894460][T16985] vfs_parse_fs_string+0xe8/0x170 [ 1621.899485][T16985] ? vfs_parse_fs_param+0x540/0x540 [ 1621.904687][T16985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1621.910918][T16985] ? alloc_fs_context+0x434/0x6d0 [ 1621.915961][T16985] do_mount+0x700/0x1c30 [ 1621.920231][T16985] ? copy_mount_string+0x40/0x40 [ 1621.925174][T16985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1621.931406][T16985] ? copy_mount_options+0x2e8/0x3f0 [ 1621.936604][T16985] ksys_mount+0xdb/0x150 [ 1621.940856][T16985] __x64_sys_mount+0xbe/0x150 [ 1621.945538][T16985] do_syscall_64+0xfa/0x760 [ 1621.950033][T16985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1621.955908][T16985] RIP: 0033:0x45c2ca [ 1621.959795][T16985] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1621.979414][T16985] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1621.987837][T16985] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1621.995904][T16985] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1622.003870][T16985] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1622.011831][T16985] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1622.019790][T16985] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:20 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000001940)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f909, 0xd408, [0x20000000000000], @p_u8=&(0x7f0000000140)}}) 10:04:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:20 executing program 0 (fault-call:4 fault-nth:71): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000643e768303c28f10d26c4500500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d336c007797a221ff070585c0000000000"], 0x4}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000200)={0x0, 0x0, 0x0, "c567799661a147480e021b42319df0df145addb9687c41994c10b5454cf530eae7b66868d4f132678f0bcf6731d07ae857e9ac01948d807ecc4b0bc8", 0x0, "5847ac3157568b420076c4978b8dd5d6d6655d30bad8a8a1604a13e5ca03f7e2d84c0c1bc097da7f6b008cbb34788803ecf6b9b6ed14ff9ed14d4fff"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x30, &(0x7f0000000180)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x2ee) [ 1624.649208][T17008] FAULT_INJECTION: forcing a failure. [ 1624.649208][T17008] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.677847][T17008] CPU: 0 PID: 17008 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1624.687014][T17008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.697085][T17008] Call Trace: [ 1624.700410][T17008] dump_stack+0x172/0x1f0 [ 1624.704775][T17008] should_fail.cold+0xa/0x15 [ 1624.709403][T17008] ? fault_create_debugfs_attr+0x180/0x180 [ 1624.715239][T17008] ? ___might_sleep+0x163/0x280 [ 1624.720117][T17008] __should_failslab+0x121/0x190 [ 1624.725085][T17008] should_failslab+0x9/0x14 [ 1624.729613][T17008] kmem_cache_alloc_trace+0x2d3/0x790 [ 1624.735003][T17008] ? kasan_kmalloc+0x9/0x10 [ 1624.739516][T17008] ? __kmalloc_node+0x4e/0x70 [ 1624.744219][T17008] btrfs_mount_root+0x174/0x1290 [ 1624.749175][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.755432][T17008] ? btrfs_decode_error+0x70/0x70 [ 1624.755455][T17008] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1624.755479][T17008] ? vfs_parse_fs_string+0x111/0x170 [ 1624.755500][T17008] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1624.755519][T17008] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1624.755537][T17008] ? __lookup_constant+0xd6/0x100 [ 1624.766749][T17008] ? security_fs_context_parse_param+0x81/0xb0 [ 1624.794678][T17008] ? logfc+0x700/0x700 [ 1624.798776][T17008] ? kfree+0x28b/0x2c0 [ 1624.802875][T17008] ? vfs_parse_fs_string+0x116/0x170 [ 1624.808184][T17008] ? btrfs_decode_error+0x70/0x70 [ 1624.813214][T17008] legacy_get_tree+0x113/0x220 [ 1624.817998][T17008] vfs_get_tree+0x8f/0x380 [ 1624.822435][T17008] fc_mount+0x17/0xc0 [ 1624.826430][T17008] vfs_kern_mount.part.0+0xd8/0xf0 [ 1624.831561][T17008] vfs_kern_mount+0x40/0x60 [ 1624.836079][T17008] btrfs_mount+0x2b4/0x15d8 [ 1624.840590][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.846837][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.853175][T17008] ? debug_smp_processor_id+0x3c/0x214 [ 1624.858661][T17008] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1624.864833][T17008] ? btrfs_remount+0x10f0/0x10f0 [ 1624.864862][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.864886][T17008] ? refcount_sub_and_test_checked+0x154/0x200 [ 1624.864909][T17008] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1624.864935][T17008] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1624.864953][T17008] ? __lookup_constant+0xd6/0x100 [ 1624.864979][T17008] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1624.864999][T17008] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1624.882287][T17008] ? apparmor_capable+0x2ed/0x630 [ 1624.882305][T17008] ? cap_capable+0x205/0x270 [ 1624.882326][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.882349][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.882376][T17008] ? btrfs_remount+0x10f0/0x10f0 [ 1624.882398][T17008] legacy_get_tree+0x113/0x220 [ 1624.882412][T17008] ? legacy_get_tree+0x113/0x220 [ 1624.882431][T17008] ? ns_capable_common+0x93/0x100 [ 1624.933321][T17008] vfs_get_tree+0x8f/0x380 [ 1624.933347][T17008] do_mount+0x13b3/0x1c30 [ 1624.933376][T17008] ? copy_mount_string+0x40/0x40 [ 1624.933411][T17008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.943076][T17008] ? copy_mount_options+0x2e8/0x3f0 [ 1624.978089][T17008] ksys_mount+0xdb/0x150 [ 1624.982363][T17008] __x64_sys_mount+0xbe/0x150 [ 1624.987069][T17008] do_syscall_64+0xfa/0x760 [ 1624.991605][T17008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.997507][T17008] RIP: 0033:0x45c2ca [ 1625.001415][T17008] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1625.021032][T17008] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1625.029463][T17008] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1625.037441][T17008] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1625.045397][T17008] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1625.053363][T17008] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1625.061328][T17008] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:28 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0, 0xffffffffffffff5b}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xb0800, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000240)="1d8c45b9b305d8dd4a068fe681c2", 0x0}, 0x28) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x2, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000280)) 10:04:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r4 = add_key(&(0x7f0000000480)='\x00\x00\x00\x00\x00\x00\x00\x00\x00^\fA>\x9c^+\xa6\xbb\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000400)="88de4d37ebf3f3cef4390a5bb0d0147a00f1814041c9eff851960d69d359693334ba67880e0d28d6d1af5a893abfef013b425ee7c3ba26412a4fdb96b866cda8e4f4fe70", 0x44, 0xfffffffffffffffd) syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x100) keyctl$get_security(0x11, r4, &(0x7f0000000380)=""/23, 0x17) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000100)=[{{0x77359400}, 0x16, 0x5, 0x5}, {{r2, r3/1000+30000}, 0x15, 0xfffffffffffffff8, 0x9}, {{0x77359400}, 0x5, 0x9, 0x1b6}, {{0x0, 0x2710}, 0x14, 0x3, 0xf1d}, {{r5, r6/1000+10000}, 0x17, 0x4, 0x9}], 0x78) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x4000900}]}]}, 0x24}}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="147e46fc7b1f008153f5ede4000000026228a409ba4f406928005d000000206d247b2fc4a7ae196dda7361141e04651f3f8cf66725b1c1f50dbb573c408904e1df976bea370dffa81771ec75789717c33e47719d23c7c6e5fc81b51d4108d45490b02d4bb50932cdc745f8bc4e4c7298e33d4cf7194a3a78208d9c7d07e9b962f08e9015bc0ad27950ce1d1f82fdea29d53ae2a508e0b32548212f991f7613a77eb3a74dc3291b6510afdc3350b1614ce38d259cbabfc01440161b61fcf0d16c05dd2201b7"], 0x14}}, 0x0) 10:04:28 executing program 0 (fault-call:4 fault-nth:72): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1632.949678][T17036] openvswitch: netlink: Tunnel attr 9 has unexpected len 0 expected 2 [ 1632.971749][T17035] FAULT_INJECTION: forcing a failure. [ 1632.971749][T17035] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.012675][T17035] CPU: 1 PID: 17035 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1633.021827][T17035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1633.031880][T17035] Call Trace: [ 1633.035175][T17035] dump_stack+0x172/0x1f0 [ 1633.039518][T17035] should_fail.cold+0xa/0x15 [ 1633.044123][T17035] ? fault_create_debugfs_attr+0x180/0x180 [ 1633.049935][T17035] ? ___might_sleep+0x163/0x280 [ 1633.054793][T17035] __should_failslab+0x121/0x190 10:04:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0xf0, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbb40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xac}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff80000000}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x33f}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000080)) [ 1633.059745][T17035] should_failslab+0x9/0x14 [ 1633.064255][T17035] kmem_cache_alloc_trace+0x2d3/0x790 [ 1633.069629][T17035] ? lockdep_init_map+0x1be/0x6d0 [ 1633.074668][T17035] legacy_init_fs_context+0x48/0xe0 [ 1633.079878][T17035] ? generic_parse_monolithic+0x200/0x200 [ 1633.085606][T17035] alloc_fs_context+0x3db/0x6d0 [ 1633.090455][T17035] fs_context_for_mount+0x25/0x30 [ 1633.095458][T17035] vfs_kern_mount.part.0+0x28/0xf0 [ 1633.100547][T17035] vfs_kern_mount+0x40/0x60 [ 1633.105052][T17035] btrfs_mount+0x2b4/0x15d8 [ 1633.109551][T17035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1633.115776][T17035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1633.121998][T17035] ? debug_smp_processor_id+0x3c/0x214 [ 1633.127469][T17035] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1633.133617][T17035] ? btrfs_remount+0x10f0/0x10f0 [ 1633.138626][T17035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1633.144858][T17035] ? refcount_sub_and_test_checked+0x154/0x200 [ 1633.151006][T17035] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1633.156364][T17035] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1633.162328][T17035] ? __lookup_constant+0xd6/0x100 [ 1633.167362][T17035] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1633.173343][T17035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1633.179567][T17035] ? apparmor_capable+0x2ed/0x630 [ 1633.184581][T17035] ? cap_capable+0x205/0x270 [ 1633.189263][T17035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1633.195667][T17035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1633.201893][T17035] ? btrfs_remount+0x10f0/0x10f0 [ 1633.206822][T17035] legacy_get_tree+0x113/0x220 [ 1633.211574][T17035] ? legacy_get_tree+0x113/0x220 [ 1633.216494][T17035] ? ns_capable_common+0x93/0x100 [ 1633.221510][T17035] vfs_get_tree+0x8f/0x380 [ 1633.225923][T17035] do_mount+0x13b3/0x1c30 [ 1633.230249][T17035] ? copy_mount_string+0x40/0x40 [ 1633.235166][T17035] ? copy_mount_options+0x26b/0x3f0 [ 1633.240343][T17035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1633.246569][T17035] ? copy_mount_options+0x2e8/0x3f0 [ 1633.251759][T17035] ksys_mount+0xdb/0x150 [ 1633.255984][T17035] __x64_sys_mount+0xbe/0x150 [ 1633.260642][T17035] do_syscall_64+0xfa/0x760 [ 1633.265146][T17035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1633.271027][T17035] RIP: 0033:0x45c2ca [ 1633.276051][T17035] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1633.295650][T17035] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1633.304065][T17035] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1633.312060][T17035] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1633.320017][T17035] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1633.327974][T17035] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1633.335940][T17035] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:29 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:29 executing program 0 (fault-call:4 fault-nth:73): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) ioctl$KDGKBMETA(r0, 0x540b, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x200000) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x4) 10:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x7, 0x4, 0x200, 0x5, 0x20}, 0x3c) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xec, 0x3, [0xff, 0x3, 0x3ff]}, &(0x7f0000000080)=0xe) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0xa, 0xd, 0x401, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0xa}, [@typed={0x14, 0x13, @ipv6=@mcast2}]}, 0x28}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x1}, &(0x7f0000000100)=0x8) [ 1633.921870][T17064] FAULT_INJECTION: forcing a failure. [ 1633.921870][T17064] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.984976][T17064] CPU: 1 PID: 17064 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1633.994124][T17064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.004184][T17064] Call Trace: [ 1634.007482][T17064] dump_stack+0x172/0x1f0 [ 1634.011825][T17064] should_fail.cold+0xa/0x15 [ 1634.016425][T17064] ? fault_create_debugfs_attr+0x180/0x180 [ 1634.022241][T17064] ? ___might_sleep+0x163/0x280 [ 1634.027102][T17064] __should_failslab+0x121/0x190 [ 1634.032048][T17064] should_failslab+0x9/0x14 [ 1634.036545][T17064] __kmalloc_track_caller+0x2dc/0x760 [ 1634.041901][T17064] ? btrfs_mount_root+0x2b8/0x1290 [ 1634.046998][T17064] kstrdup+0x3a/0x70 [ 1634.050871][T17064] btrfs_mount_root+0x2b8/0x1290 [ 1634.055812][T17064] ? btrfs_decode_error+0x70/0x70 [ 1634.060828][T17064] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1634.066965][T17064] ? vfs_parse_fs_string+0x111/0x170 [ 1634.072232][T17064] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1634.077759][T17064] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1634.083726][T17064] ? __lookup_constant+0xd6/0x100 [ 1634.088746][T17064] ? security_fs_context_parse_param+0x81/0xb0 [ 1634.094889][T17064] ? logfc+0x700/0x700 [ 1634.098949][T17064] ? kfree+0x28b/0x2c0 [ 1634.103021][T17064] ? vfs_parse_fs_string+0x116/0x170 [ 1634.108297][T17064] ? btrfs_decode_error+0x70/0x70 [ 1634.113307][T17064] legacy_get_tree+0x113/0x220 [ 1634.118064][T17064] vfs_get_tree+0x8f/0x380 [ 1634.122470][T17064] fc_mount+0x17/0xc0 [ 1634.126445][T17064] vfs_kern_mount.part.0+0xd8/0xf0 [ 1634.131544][T17064] vfs_kern_mount+0x40/0x60 [ 1634.136037][T17064] btrfs_mount+0x2b4/0x15d8 [ 1634.140529][T17064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1634.146749][T17064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1634.152986][T17064] ? debug_smp_processor_id+0x3c/0x214 [ 1634.158440][T17064] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1634.164594][T17064] ? btrfs_remount+0x10f0/0x10f0 [ 1634.169523][T17064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1634.175747][T17064] ? refcount_sub_and_test_checked+0x154/0x200 [ 1634.181879][T17064] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1634.187232][T17064] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1634.193208][T17064] ? __lookup_constant+0xd6/0x100 [ 1634.198231][T17064] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1634.204198][T17064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1634.210431][T17064] ? apparmor_capable+0x2ed/0x630 [ 1634.215448][T17064] ? cap_capable+0x205/0x270 [ 1634.220030][T17064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1634.226264][T17064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1634.232513][T17064] ? btrfs_remount+0x10f0/0x10f0 [ 1634.237452][T17064] legacy_get_tree+0x113/0x220 [ 1634.242197][T17064] ? legacy_get_tree+0x113/0x220 [ 1634.247111][T17064] ? ns_capable_common+0x93/0x100 [ 1634.252117][T17064] vfs_get_tree+0x8f/0x380 [ 1634.256516][T17064] do_mount+0x13b3/0x1c30 [ 1634.260828][T17064] ? copy_mount_string+0x40/0x40 [ 1634.265749][T17064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1634.272005][T17064] ? copy_mount_options+0x2e8/0x3f0 [ 1634.277186][T17064] ksys_mount+0xdb/0x150 [ 1634.281418][T17064] __x64_sys_mount+0xbe/0x150 [ 1634.286086][T17064] do_syscall_64+0xfa/0x760 [ 1634.290588][T17064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1634.296491][T17064] RIP: 0033:0x45c2ca [ 1634.300366][T17064] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1634.319952][T17064] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1634.328344][T17064] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1634.336294][T17064] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1634.344252][T17064] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1634.352215][T17064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1634.360178][T17064] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:35 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) kexec_load(0x7fffffff, 0x6, &(0x7f0000000280)=[{&(0x7f0000000080)="213abd", 0x3, 0xa09a, 0x9}, {&(0x7f0000000900)="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", 0x1000, 0xde2, 0x9}, {&(0x7f00000000c0)="9f23a0637aebcb295d8dcaffc4e11fe3be2c8e9854d3f3279c4ac2b9c89771cec934111cc28fcf2cf17f88cdd86f9a370b14d8c6a57ce689803c2b47c98a83b62eb91f431b2e7573f3b0eea9f83860be02c4bf09cc5d0fc8d8dd0dfff7396528925a921cea66ccb2b4438dbf6fc26b775068e63a762c3974d19eb5f7338844c22b8d890680f1418981573576f63ded6416aea2b28becdcfa3fe11262bbd581d9209aa5f760", 0xa5, 0x9, 0x54}, {&(0x7f00000001c0)="350b5d286dc8cda7e330f11dde1f938180ee6e27f72b11b18b9d21d36174be66edc2fde32f80cab11526a539ca466de2d72ea321480c6d9774de82dd8627200a2123356b9ce5eb4faf85217997", 0x4d, 0x3, 0x9b}, {&(0x7f0000000240)="692790893de431c95a8a59092cc2e8003aedb9740382c8446a7a", 0x1a, 0xb929, 0x10001}, {&(0x7f0000001a00)="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", 0x1000, 0x3f, 0x7}], 0x280000) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:35 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)=0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xaec, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/220) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="5b643a3a5d2c303a04003afbb781000000000000007622b1dfb291fdef9638a0d75290885f5471e51d"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(r1, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) tkill(r0, 0x1002000000013) 10:04:35 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000005c0)=0x800000100000001, 0x4) utime(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x5, 0x7fff}) accept$unix(r0, 0x0, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000140), 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x1, 0xccf, 0x206, 0x200040, 0x2, 0x7, 0x3ff, 0x9, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={r2, 0x9c, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x3ff, @mcast1, 0x100}, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x23}, 0x3}, @in6={0xa, 0x4e24, 0x7, @remote, 0xffffffff}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x6, @mcast2, 0x100000001}, @in6={0xa, 0x4e21, 0x5, @mcast1, 0x8}]}, &(0x7f0000000340)=0x10) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x303}, "658bdce8f16b6900", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYBLOB="e50000005cb830bd602a0dc27fc829fc8a3dca27aaad3bfb4c7afd2dfc7831bf884878377850ff8534dd95362f170cd6cf906ccf86213481482f60d76206785cc3d507294ffda9f464e0cac13c8645c84f7f0efd3c99886767ec801d3465a1aeaa18ccdfeb390000af3868c08a847ea8eabe3da043277f12a45981791b91a79ff50eec6c175010eeccfad88ae6204b49b0c3441c7393d3bfdcf961ad196aa0705090962752a266cd590388d3bbb271515b08c127e661c023514498ee05a5aa74a90ff015ea1a7dfad0ae43fedb594c8d84a26f8cd4e3fc905988f541cd99ff792989ae4b05fa94eaa4"], &(0x7f0000000100)=0xed) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0xf) openat$audio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/audio\x00', 0x800, 0x0) 10:04:35 executing program 0 (fault-call:4 fault-nth:74): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1640.089463][T17088] device name is missing path (no : separator in [d::],0:) [ 1640.089463][T17088] [ 1640.113740][T17087] FAULT_INJECTION: forcing a failure. [ 1640.113740][T17087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1640.126983][T17087] CPU: 1 PID: 17087 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1640.136093][T17087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1640.146153][T17087] Call Trace: [ 1640.149452][T17087] dump_stack+0x172/0x1f0 [ 1640.153794][T17087] should_fail.cold+0xa/0x15 [ 1640.158475][T17087] ? fault_create_debugfs_attr+0x180/0x180 [ 1640.164283][T17087] ? perf_trace_lock+0xeb/0x4c0 [ 1640.169115][T17087] ? __kasan_check_read+0x11/0x20 [ 1640.174124][T17087] should_fail_alloc_page+0x50/0x60 [ 1640.179300][T17087] __alloc_pages_nodemask+0x1a1/0x900 [ 1640.184668][T17087] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1640.190291][T17087] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1640.195985][T17087] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1640.201602][T17087] ? fault_create_debugfs_attr+0x180/0x180 [ 1640.207391][T17087] cache_grow_begin+0x90/0xd20 [ 1640.212141][T17087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1640.218364][T17087] kmem_cache_alloc_trace+0x6b3/0x790 [ 1640.223715][T17087] ? kasan_kmalloc+0x9/0x10 [ 1640.228204][T17087] btrfs_mount_root+0x1d0/0x1290 [ 1640.233129][T17087] ? btrfs_decode_error+0x70/0x70 [ 1640.238138][T17087] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1640.244274][T17087] ? vfs_parse_fs_string+0x111/0x170 [ 1640.249577][T17087] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1640.255108][T17087] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1640.261073][T17087] ? __lookup_constant+0xd6/0x100 [ 1640.266087][T17087] ? security_fs_context_parse_param+0x81/0xb0 [ 1640.272224][T17087] ? logfc+0x700/0x700 [ 1640.276292][T17087] ? kfree+0x28b/0x2c0 [ 1640.280355][T17087] ? vfs_parse_fs_string+0x116/0x170 [ 1640.285630][T17087] ? btrfs_decode_error+0x70/0x70 [ 1640.290639][T17087] legacy_get_tree+0x113/0x220 [ 1640.295399][T17087] vfs_get_tree+0x8f/0x380 [ 1640.299793][T17087] fc_mount+0x17/0xc0 [ 1640.303755][T17087] vfs_kern_mount.part.0+0xd8/0xf0 [ 1640.308847][T17087] vfs_kern_mount+0x40/0x60 [ 1640.313430][T17087] btrfs_mount+0x2b4/0x15d8 [ 1640.317918][T17087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1640.324231][T17087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1640.330468][T17087] ? debug_smp_processor_id+0x3c/0x214 [ 1640.335928][T17087] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1640.342066][T17087] ? btrfs_remount+0x10f0/0x10f0 [ 1640.347104][T17087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1640.353329][T17087] ? refcount_sub_and_test_checked+0x154/0x200 [ 1640.359464][T17087] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1640.364822][T17087] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1640.370778][T17087] ? __lookup_constant+0xd6/0x100 [ 1640.375792][T17087] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1640.381755][T17087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1640.387983][T17087] ? apparmor_capable+0x2ed/0x630 [ 1640.393001][T17087] ? cap_capable+0x205/0x270 [ 1640.397577][T17087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1640.403798][T17087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1640.410024][T17087] ? btrfs_remount+0x10f0/0x10f0 [ 1640.414944][T17087] legacy_get_tree+0x113/0x220 [ 1640.419687][T17087] ? legacy_get_tree+0x113/0x220 [ 1640.424627][T17087] ? ns_capable_common+0x93/0x100 [ 1640.429649][T17087] vfs_get_tree+0x8f/0x380 [ 1640.434060][T17087] do_mount+0x13b3/0x1c30 [ 1640.438378][T17087] ? copy_mount_string+0x40/0x40 [ 1640.443300][T17087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1640.449523][T17087] ? _copy_from_user+0x12c/0x1a0 [ 1640.454440][T17087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1640.460658][T17087] ? copy_mount_options+0x2e8/0x3f0 [ 1640.465843][T17087] ksys_mount+0xdb/0x150 [ 1640.470075][T17087] __x64_sys_mount+0xbe/0x150 [ 1640.474845][T17087] do_syscall_64+0xfa/0x760 [ 1640.479424][T17087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1640.485295][T17087] RIP: 0033:0x45c2ca [ 1640.489170][T17087] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1640.508771][T17087] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1640.517167][T17087] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1640.525122][T17087] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1640.533104][T17087] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1640.541056][T17087] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1640.549010][T17087] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000040)=[{0x74, 0x3, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 10:04:40 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:40 executing program 0 (fault-call:4 fault-nth:75): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x402, 0x0) ioctl$SIOCRSACCEPT(r1, 0x89e3) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000000)=0x3) shutdown(r0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000240)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x0, @rand_addr="a031ffeec8466da6bdde20d676cee234"}]}, &(0x7f0000000280)=0x10) 10:04:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00002e0000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000040)=0x41e, 0x570a, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) [ 1645.266320][T17113] FAULT_INJECTION: forcing a failure. [ 1645.266320][T17113] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.298826][T17113] CPU: 1 PID: 17113 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1645.307958][T17113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1645.317997][T17113] Call Trace: [ 1645.321281][T17113] dump_stack+0x172/0x1f0 [ 1645.325711][T17113] should_fail.cold+0xa/0x15 [ 1645.330350][T17113] ? fault_create_debugfs_attr+0x180/0x180 [ 1645.336150][T17113] ? ___might_sleep+0x163/0x280 [ 1645.340984][T17113] __should_failslab+0x121/0x190 [ 1645.345906][T17113] should_failslab+0x9/0x14 [ 1645.350407][T17113] kmem_cache_alloc_trace+0x2d3/0x790 [ 1645.355786][T17113] ? kasan_kmalloc+0x9/0x10 [ 1645.360266][T17113] ? __kmalloc_node+0x4e/0x70 [ 1645.364928][T17113] btrfs_mount_root+0x174/0x1290 [ 1645.369849][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.376101][T17113] ? btrfs_decode_error+0x70/0x70 [ 1645.381112][T17113] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1645.387395][T17113] ? vfs_parse_fs_string+0x111/0x170 [ 1645.392681][T17113] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1645.398223][T17113] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1645.404199][T17113] ? __lookup_constant+0xd6/0x100 [ 1645.409211][T17113] ? security_fs_context_parse_param+0x81/0xb0 [ 1645.415400][T17113] ? logfc+0x700/0x700 [ 1645.419469][T17113] ? kfree+0x28b/0x2c0 [ 1645.423520][T17113] ? vfs_parse_fs_string+0x116/0x170 [ 1645.428787][T17113] ? btrfs_decode_error+0x70/0x70 [ 1645.433807][T17113] legacy_get_tree+0x113/0x220 [ 1645.438558][T17113] vfs_get_tree+0x8f/0x380 [ 1645.442960][T17113] fc_mount+0x17/0xc0 [ 1645.446922][T17113] vfs_kern_mount.part.0+0xd8/0xf0 [ 1645.452016][T17113] vfs_kern_mount+0x40/0x60 [ 1645.456503][T17113] btrfs_mount+0x2b4/0x15d8 [ 1645.461000][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.467230][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.473459][T17113] ? debug_smp_processor_id+0x3c/0x214 [ 1645.478984][T17113] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1645.485146][T17113] ? btrfs_remount+0x10f0/0x10f0 [ 1645.490082][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.496315][T17113] ? refcount_sub_and_test_checked+0x154/0x200 [ 1645.502453][T17113] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1645.507823][T17113] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1645.513793][T17113] ? __lookup_constant+0xd6/0x100 [ 1645.518813][T17113] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1645.524780][T17113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1645.531240][T17113] ? apparmor_capable+0x2ed/0x630 [ 1645.536261][T17113] ? cap_capable+0x205/0x270 [ 1645.540854][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.547143][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.553393][T17113] ? btrfs_remount+0x10f0/0x10f0 [ 1645.558325][T17113] legacy_get_tree+0x113/0x220 [ 1645.563068][T17113] ? legacy_get_tree+0x113/0x220 [ 1645.567992][T17113] ? ns_capable_common+0x93/0x100 [ 1645.573012][T17113] vfs_get_tree+0x8f/0x380 [ 1645.577417][T17113] do_mount+0x13b3/0x1c30 [ 1645.581733][T17113] ? copy_mount_string+0x40/0x40 [ 1645.586659][T17113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.592984][T17113] ? copy_mount_options+0x2e8/0x3f0 [ 1645.598177][T17113] ksys_mount+0xdb/0x150 [ 1645.602412][T17113] __x64_sys_mount+0xbe/0x150 [ 1645.607089][T17113] do_syscall_64+0xfa/0x760 [ 1645.611581][T17113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.617453][T17113] RIP: 0033:0x45c2ca [ 1645.621346][T17113] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1645.640935][T17113] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1645.649337][T17113] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1645.657453][T17113] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1645.665414][T17113] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1645.673369][T17113] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1645.681323][T17113] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:42 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) sendto$ax25(r0, &(0x7f0000000080)="0fb855f3b63fcce800c269eaee33", 0xe, 0x0, &(0x7f00000000c0)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x20}, 0xfc) 10:04:42 executing program 4: r0 = creat(&(0x7f0000000140)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfea4) r2 = getgid() setfsgid(r2) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) fallocate(r0, 0x11, 0xfffffffffffffffb, 0x7ffe) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000080)=0x1b) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000300)=0xe8) dup2(r3, r1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x29b, 0x0}, @in6=@ipv4={[], [], @remote}, 0x4e22, 0x401, 0x4e22, 0x1, 0xa, 0x20, 0x20, 0x2c, r4, r5}, {0x4, 0x1, 0x0, 0x4, 0x400, 0x1, 0xffff, 0x2}, {0x6, 0x3, 0xff, 0x9}, 0x8, 0x0, 0x3, 0x1, 0x172473af397a8bf2, 0x1}, {{@in=@remote, 0x4d4, 0x32}, 0x2, @in=@loopback, 0x0, 0x2, 0x2, 0xfff, 0x10001, 0x80, 0x10000}}, 0xe8) 10:04:42 executing program 0 (fault-call:4 fault-nth:76): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1647.322044][T17131] FAULT_INJECTION: forcing a failure. [ 1647.322044][T17131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1647.335285][T17131] CPU: 1 PID: 17131 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1647.344401][T17131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1647.354458][T17131] Call Trace: [ 1647.357753][T17131] dump_stack+0x172/0x1f0 [ 1647.362096][T17131] should_fail.cold+0xa/0x15 [ 1647.366704][T17131] ? fault_create_debugfs_attr+0x180/0x180 10:04:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) r3 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r4 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sendfile(r3, r3, 0x0, 0x40fdf) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x80) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x1000) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000680), r5, 0x1}}, 0x18) [ 1647.372525][T17131] ? perf_trace_lock+0xeb/0x4c0 [ 1647.377382][T17131] ? __kasan_check_read+0x11/0x20 [ 1647.382425][T17131] should_fail_alloc_page+0x50/0x60 [ 1647.387634][T17131] __alloc_pages_nodemask+0x1a1/0x900 [ 1647.393019][T17131] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1647.398658][T17131] ? __alloc_pages_slowpath+0x2540/0x2540 [ 1647.404372][T17131] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1647.410064][T17131] ? fault_create_debugfs_attr+0x180/0x180 [ 1647.415867][T17131] cache_grow_begin+0x90/0xd20 [ 1647.420615][T17131] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1647.426844][T17131] kmem_cache_alloc_trace+0x6b3/0x790 [ 1647.432340][T17131] ? kasan_kmalloc+0x9/0x10 [ 1647.436832][T17131] btrfs_mount_root+0x174/0x1290 [ 1647.441749][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.447966][T17131] ? btrfs_decode_error+0x70/0x70 [ 1647.452967][T17131] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1647.459129][T17131] ? vfs_parse_fs_string+0x111/0x170 [ 1647.464421][T17131] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1647.469945][T17131] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1647.476075][T17131] ? __lookup_constant+0xd6/0x100 [ 1647.481099][T17131] ? security_fs_context_parse_param+0x81/0xb0 [ 1647.487250][T17131] ? logfc+0x700/0x700 [ 1647.491308][T17131] ? kfree+0x28b/0x2c0 [ 1647.495370][T17131] ? vfs_parse_fs_string+0x116/0x170 [ 1647.500721][T17131] ? btrfs_decode_error+0x70/0x70 [ 1647.505731][T17131] legacy_get_tree+0x113/0x220 [ 1647.510529][T17131] vfs_get_tree+0x8f/0x380 [ 1647.514980][T17131] fc_mount+0x17/0xc0 [ 1647.518945][T17131] vfs_kern_mount.part.0+0xd8/0xf0 [ 1647.524041][T17131] vfs_kern_mount+0x40/0x60 [ 1647.528522][T17131] btrfs_mount+0x2b4/0x15d8 [ 1647.533027][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.539512][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.545868][T17131] ? debug_smp_processor_id+0x3c/0x214 [ 1647.551314][T17131] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1647.557447][T17131] ? btrfs_remount+0x10f0/0x10f0 [ 1647.562365][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.568596][T17131] ? refcount_sub_and_test_checked+0x154/0x200 [ 1647.574745][T17131] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1647.580153][T17131] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1647.586115][T17131] ? __lookup_constant+0xd6/0x100 [ 1647.591127][T17131] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1647.597100][T17131] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1647.603321][T17131] ? apparmor_capable+0x2ed/0x630 [ 1647.608318][T17131] ? cap_capable+0x205/0x270 [ 1647.612899][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.619165][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.625393][T17131] ? btrfs_remount+0x10f0/0x10f0 [ 1647.630311][T17131] legacy_get_tree+0x113/0x220 [ 1647.635050][T17131] ? legacy_get_tree+0x113/0x220 [ 1647.639978][T17131] ? ns_capable_common+0x93/0x100 [ 1647.644983][T17131] vfs_get_tree+0x8f/0x380 [ 1647.649391][T17131] do_mount+0x13b3/0x1c30 [ 1647.653702][T17131] ? copy_mount_string+0x40/0x40 [ 1647.658633][T17131] ? copy_mount_options+0x258/0x3f0 [ 1647.663821][T17131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.670148][T17131] ? copy_mount_options+0x2e8/0x3f0 [ 1647.675347][T17131] ksys_mount+0xdb/0x150 [ 1647.679577][T17131] __x64_sys_mount+0xbe/0x150 [ 1647.684238][T17131] do_syscall_64+0xfa/0x760 [ 1647.688721][T17131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.694595][T17131] RIP: 0033:0x45c2ca [ 1647.698592][T17131] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1647.718183][T17131] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1647.726578][T17131] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1647.734528][T17131] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1647.742478][T17131] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1647.750439][T17131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1647.758391][T17131] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:53 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:04:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x80) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:04:53 executing program 0 (fault-call:4 fault-nth:77): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:04:53 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECUREBITS(0x1c, 0x29) socket$inet(0x2, 0x6, 0x3) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 10:04:53 executing program 1: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) writev(r3, &(0x7f0000000700), 0x10000000000000ea) r4 = gettid() ptrace$setregset(0x4205, r4, 0x2, &(0x7f0000000140)={&(0x7f0000000080)="345a42c00e41a830fa952c5c7a3f5c862653d42695c852502310f6de5c4cdfdb6f6c73e6a8ea26b56d3c7ab11cfbbd2e5167586b472cdcac91e45f1783b5dd858ed13cd6211b8d3162964c563b358d228d34c3a77af9b1236f4ac951a6902c91781407e2339c7503416d32231a2cf606e6f743dedf7935461f62f2d8ebbc951bc7aafe74446504fbe24b02cd973ebd4a68106cfce1874021796de1094600", 0x9e}) 10:04:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1657.886952][T17174] FAULT_INJECTION: forcing a failure. [ 1657.886952][T17174] name failslab, interval 1, probability 0, space 0, times 0 [ 1657.924517][T17174] CPU: 1 PID: 17174 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1657.933772][T17174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1657.943832][T17174] Call Trace: [ 1657.947133][T17174] dump_stack+0x172/0x1f0 [ 1657.951482][T17174] should_fail.cold+0xa/0x15 [ 1657.956095][T17174] ? fault_create_debugfs_attr+0x180/0x180 [ 1657.961920][T17174] ? ___might_sleep+0x163/0x280 [ 1657.966785][T17174] __should_failslab+0x121/0x190 [ 1657.971726][T17174] should_failslab+0x9/0x14 [ 1657.976235][T17174] kmem_cache_alloc_trace+0x2d3/0x790 [ 1657.981600][T17174] ? kasan_kmalloc+0x9/0x10 [ 1657.986092][T17174] ? __kmalloc_node+0x4e/0x70 [ 1657.990771][T17174] btrfs_mount_root+0x174/0x1290 [ 1657.995712][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.001947][T17174] ? btrfs_decode_error+0x70/0x70 [ 1658.006966][T17174] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1658.013124][T17174] ? vfs_parse_fs_string+0x111/0x170 [ 1658.018419][T17174] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1658.023973][T17174] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1658.029956][T17174] ? __lookup_constant+0xd6/0x100 [ 1658.034986][T17174] ? security_fs_context_parse_param+0x81/0xb0 [ 1658.041140][T17174] ? logfc+0x700/0x700 [ 1658.045217][T17174] ? kfree+0x28b/0x2c0 [ 1658.049329][T17174] ? vfs_parse_fs_string+0x116/0x170 [ 1658.054618][T17174] ? btrfs_decode_error+0x70/0x70 [ 1658.059646][T17174] legacy_get_tree+0x113/0x220 [ 1658.064419][T17174] vfs_get_tree+0x8f/0x380 [ 1658.068843][T17174] fc_mount+0x17/0xc0 [ 1658.072827][T17174] vfs_kern_mount.part.0+0xd8/0xf0 [ 1658.077930][T17174] vfs_kern_mount+0x40/0x60 [ 1658.082431][T17174] btrfs_mount+0x2b4/0x15d8 [ 1658.086943][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.093186][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.099436][T17174] ? debug_smp_processor_id+0x3c/0x214 [ 1658.104904][T17174] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1658.111072][T17174] ? btrfs_remount+0x10f0/0x10f0 [ 1658.116016][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.122272][T17174] ? refcount_sub_and_test_checked+0x154/0x200 [ 1658.128432][T17174] ? refcount_dec_not_one+0x1f0/0x1f0 10:04:53 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x200) getsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) clock_adjtime(0xffc99a3b, &(0x7f00000002c0)) [ 1658.133813][T17174] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1658.139795][T17174] ? __lookup_constant+0xd6/0x100 [ 1658.144829][T17174] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1658.150815][T17174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1658.157058][T17174] ? apparmor_capable+0x2ed/0x630 [ 1658.162083][T17174] ? cap_capable+0x205/0x270 [ 1658.166676][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.172919][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.179168][T17174] ? btrfs_remount+0x10f0/0x10f0 [ 1658.184110][T17174] legacy_get_tree+0x113/0x220 [ 1658.188870][T17174] ? legacy_get_tree+0x113/0x220 [ 1658.193823][T17174] ? ns_capable_common+0x93/0x100 [ 1658.198862][T17174] vfs_get_tree+0x8f/0x380 [ 1658.203275][T17174] do_mount+0x13b3/0x1c30 [ 1658.207603][T17174] ? copy_mount_string+0x40/0x40 [ 1658.212546][T17174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.218794][T17174] ? copy_mount_options+0x2e8/0x3f0 [ 1658.223992][T17174] ksys_mount+0xdb/0x150 [ 1658.228241][T17174] __x64_sys_mount+0xbe/0x150 [ 1658.232931][T17174] do_syscall_64+0xfa/0x760 [ 1658.237430][T17174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1658.243305][T17174] RIP: 0033:0x45c2ca [ 1658.247203][T17174] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1658.267318][T17174] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1658.275713][T17174] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca 10:04:53 executing program 4: capset(&(0x7f0000000180)={0x400019980330}, &(0x7f0000000200)) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)=0x3) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x4000) 10:04:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1658.283682][T17174] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1658.291641][T17174] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1658.299588][T17174] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1658.307535][T17174] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:04:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:04:54 executing program 0 (fault-call:4 fault-nth:78): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1658.643679][T17209] FAULT_INJECTION: forcing a failure. [ 1658.643679][T17209] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.657057][T17209] CPU: 0 PID: 17209 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1658.666190][T17209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1658.676261][T17209] Call Trace: [ 1658.679574][T17209] dump_stack+0x172/0x1f0 [ 1658.683939][T17209] should_fail.cold+0xa/0x15 [ 1658.688559][T17209] ? fault_create_debugfs_attr+0x180/0x180 [ 1658.694392][T17209] ? ___might_sleep+0x163/0x280 [ 1658.699265][T17209] __should_failslab+0x121/0x190 [ 1658.704206][T17209] should_failslab+0x9/0x14 [ 1658.704240][T17209] kmem_cache_alloc+0x2aa/0x710 [ 1658.704277][T17209] getname_kernel+0x53/0x370 [ 1658.718187][T17209] kern_path+0x20/0x40 [ 1658.722278][T17209] lookup_bdev.part.0+0x7b/0x1b0 [ 1658.727232][T17209] ? blkdev_open+0x290/0x290 [ 1658.731845][T17209] ? btrfs_open_devices+0x74/0x170 [ 1658.736998][T17209] blkdev_get_by_path+0x81/0x130 [ 1658.741955][T17209] btrfs_get_bdev_and_sb+0x38/0x300 [ 1658.747183][T17209] open_fs_devices+0x6e7/0xc40 [ 1658.751985][T17209] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 1658.757662][T17209] btrfs_open_devices+0x147/0x170 [ 1658.762786][T17209] btrfs_mount_root+0x79a/0x1290 [ 1658.767721][T17209] ? btrfs_decode_error+0x70/0x70 [ 1658.772739][T17209] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1658.778900][T17209] ? vfs_parse_fs_string+0x111/0x170 [ 1658.784175][T17209] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1658.789702][T17209] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1658.795666][T17209] ? __lookup_constant+0xd6/0x100 [ 1658.800673][T17209] ? security_fs_context_parse_param+0x81/0xb0 [ 1658.806821][T17209] ? logfc+0x700/0x700 [ 1658.810884][T17209] ? kfree+0x28b/0x2c0 [ 1658.814953][T17209] ? vfs_parse_fs_string+0x116/0x170 [ 1658.820245][T17209] ? btrfs_decode_error+0x70/0x70 [ 1658.825266][T17209] legacy_get_tree+0x113/0x220 [ 1658.830021][T17209] vfs_get_tree+0x8f/0x380 [ 1658.834430][T17209] fc_mount+0x17/0xc0 [ 1658.838398][T17209] vfs_kern_mount.part.0+0xd8/0xf0 [ 1658.843501][T17209] vfs_kern_mount+0x40/0x60 [ 1658.847989][T17209] btrfs_mount+0x2b4/0x15d8 [ 1658.852476][T17209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.858696][T17209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.864923][T17209] ? debug_smp_processor_id+0x3c/0x214 [ 1658.870383][T17209] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1658.876548][T17209] ? btrfs_remount+0x10f0/0x10f0 [ 1658.881474][T17209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.887724][T17209] ? refcount_sub_and_test_checked+0x154/0x200 [ 1658.893862][T17209] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1658.899305][T17209] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1658.905267][T17209] ? __lookup_constant+0xd6/0x100 [ 1658.910293][T17209] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1658.916256][T17209] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1658.922481][T17209] ? apparmor_capable+0x2ed/0x630 [ 1658.927486][T17209] ? cap_capable+0x205/0x270 [ 1658.932069][T17209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.938294][T17209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.944540][T17209] ? btrfs_remount+0x10f0/0x10f0 [ 1658.949464][T17209] legacy_get_tree+0x113/0x220 [ 1658.954221][T17209] ? legacy_get_tree+0x113/0x220 [ 1658.959137][T17209] ? ns_capable_common+0x93/0x100 [ 1658.964148][T17209] vfs_get_tree+0x8f/0x380 [ 1658.968551][T17209] do_mount+0x13b3/0x1c30 [ 1658.972869][T17209] ? copy_mount_string+0x40/0x40 [ 1658.979030][T17209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1658.986071][T17209] ? copy_mount_options+0x2e8/0x3f0 [ 1658.991271][T17209] ksys_mount+0xdb/0x150 [ 1658.995503][T17209] __x64_sys_mount+0xbe/0x150 [ 1659.000191][T17209] do_syscall_64+0xfa/0x760 [ 1659.004695][T17209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.010575][T17209] RIP: 0033:0x45c2ca [ 1659.014456][T17209] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1659.034040][T17209] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1659.042439][T17209] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1659.050403][T17209] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1659.058368][T17209] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1659.066321][T17209] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1659.074272][T17209] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 10:05:01 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r4}) writev(r3, &(0x7f0000000700), 0x10000000000000ea) 10:05:01 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000001c0)) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600610000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000a00000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000900), 0x4) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="02040000020000000013000000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 10:05:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x80000) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, r1, 0x300, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4044}, 0x4008000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20002, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000600)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x8005, 0x0, 0x0, 0x11) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000000c0)='/dev/dlm-monitor\x00', &(0x7f0000000100)='/dev/dlm-monitor\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='selinuxvmnet1vboxnet0\x00', &(0x7f00000001c0)='-'], &(0x7f0000000440)=[&(0x7f0000000240)='/dev/dlm-monitor\x00', &(0x7f0000000280)='/dev/dlm-monitor\x00', &(0x7f00000002c0)='}\x00', &(0x7f0000000300)='vmnet1posix_acl_accessppp1security\x00', &(0x7f0000000340)='/dev/dlm-monitor\x00', &(0x7f0000000380)='/dev/dlm-monitor\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/dev/dlm-monitor\x00']) 10:05:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) 10:05:01 executing program 0 (fault-call:4 fault-nth:79): connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000700)="8da4363ac0ed00008cffffff0002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 10:05:01 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10, 0x553826ee3dba9fe) getsockopt$inet_dccp_buf(r0, 0x21, 0xd, &(0x7f00000001c0)=""/174, &(0x7f0000000100)=0xae) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r2 = accept4$x25(0xffffffffffffffff, &(0x7f0000000480)={0x9, @remote}, &(0x7f00000004c0)=0x12, 0x80800) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x200, 0xfffffffffffffff7}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001980)={@dev={0xfe, 0x80, [], 0xa}, @local, @loopback, 0x80, 0x0, 0x8, 0x100, 0x7, 0x40, r5}) writev(r4, &(0x7f0000000700), 0x10000000000000ea) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000000c0)={0x0, 0x2, 0x9}) 10:05:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1666.333252][T17229] FAULT_INJECTION: forcing a failure. [ 1666.333252][T17229] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.381588][T17229] CPU: 0 PID: 17229 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1666.390747][T17229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.400811][T17229] Call Trace: [ 1666.404109][T17229] dump_stack+0x172/0x1f0 [ 1666.404143][T17229] should_fail.cold+0xa/0x15 [ 1666.404171][T17229] ? fault_create_debugfs_attr+0x180/0x180 [ 1666.418894][T17229] ? ___might_sleep+0x163/0x280 [ 1666.423775][T17229] __should_failslab+0x121/0x190 [ 1666.428743][T17229] should_failslab+0x9/0x14 [ 1666.433264][T17229] kmem_cache_alloc_trace+0x2d3/0x790 [ 1666.438654][T17229] ? bd_set_size+0xb0/0xb0 [ 1666.455166][T17229] ? wait_for_completion+0x440/0x440 [ 1666.460494][T17229] btrfs_alloc_device+0xb4/0x700 [ 1666.465461][T17229] ? btrfs_find_device_by_devspec+0x620/0x620 [ 1666.471536][T17229] ? blkdev_put+0x98/0x560 [ 1666.476009][T17229] close_fs_devices.part.0+0x1f2/0x7f0 [ 1666.481502][T17229] btrfs_close_devices+0xa0/0x200 [ 1666.486550][T17229] btrfs_mount_root+0xf49/0x1290 [ 1666.491521][T17229] ? btrfs_decode_error+0x70/0x70 [ 1666.496566][T17229] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1666.502734][T17229] ? vfs_parse_fs_string+0x111/0x170 [ 1666.508035][T17229] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1666.513601][T17229] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1666.519593][T17229] ? __lookup_constant+0xd6/0x100 [ 1666.524636][T17229] ? security_fs_context_parse_param+0x81/0xb0 10:05:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/42, 0x2a}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfff7, 0x0, 0x0, 0x800e00507) shutdown(r0, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) recvfrom$inet(r1, 0x0, 0xcffa, 0x0, 0x0, 0x800e006d9) shutdown(r1, 0x0) [ 1666.530807][T17229] ? logfc+0x700/0x700 [ 1666.534895][T17229] ? kfree+0x28b/0x2c0 [ 1666.538983][T17229] ? vfs_parse_fs_string+0x116/0x170 [ 1666.544289][T17229] ? btrfs_decode_error+0x70/0x70 [ 1666.549327][T17229] legacy_get_tree+0x113/0x220 [ 1666.554109][T17229] vfs_get_tree+0x8f/0x380 [ 1666.558542][T17229] fc_mount+0x17/0xc0 [ 1666.562545][T17229] vfs_kern_mount.part.0+0xd8/0xf0 [ 1666.567671][T17229] vfs_kern_mount+0x40/0x60 [ 1666.572329][T17229] btrfs_mount+0x2b4/0x15d8 [ 1666.576850][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1666.583093][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1666.583114][T17229] ? debug_smp_processor_id+0x3c/0x214 [ 1666.583141][T17229] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1666.583177][T17229] ? btrfs_remount+0x10f0/0x10f0 [ 1666.605911][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1666.605940][T17229] ? refcount_sub_and_test_checked+0x154/0x200 [ 1666.618319][T17229] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1666.623836][T17229] ? rcu_read_lock_any_held.part.0+0x50/0x50 10:05:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1666.629837][T17229] ? __lookup_constant+0xd6/0x100 [ 1666.634896][T17229] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1666.640901][T17229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1666.647160][T17229] ? apparmor_capable+0x2ed/0x630 [ 1666.652216][T17229] ? cap_capable+0x205/0x270 [ 1666.656879][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1666.663146][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1666.669418][T17229] ? btrfs_remount+0x10f0/0x10f0 [ 1666.674375][T17229] legacy_get_tree+0x113/0x220 [ 1666.679174][T17229] ? legacy_get_tree+0x113/0x220 [ 1666.684121][T17229] ? ns_capable_common+0x93/0x100 [ 1666.689184][T17229] vfs_get_tree+0x8f/0x380 [ 1666.693627][T17229] do_mount+0x13b3/0x1c30 [ 1666.697990][T17229] ? copy_mount_string+0x40/0x40 [ 1666.702953][T17229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1666.709212][T17229] ? _copy_from_user+0x12c/0x1a0 [ 1666.714181][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1666.720436][T17229] ? copy_mount_options+0x2e8/0x3f0 [ 1666.725667][T17229] ksys_mount+0xdb/0x150 10:05:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1666.729932][T17229] __x64_sys_mount+0xbe/0x150 [ 1666.734661][T17229] do_syscall_64+0xfa/0x760 [ 1666.739200][T17229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1666.745196][T17229] RIP: 0033:0x45c2ca [ 1666.749106][T17229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1666.768717][T17229] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1666.768734][T17229] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1666.768744][T17229] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1666.768755][T17229] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1666.768765][T17229] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1666.768775][T17229] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1666.778137][T17229] ------------[ cut here ]------------ [ 1666.822672][T17229] kernel BUG at fs/btrfs/volumes.c:1056! [ 1666.823495][T17229] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1666.834481][T17229] CPU: 0 PID: 17229 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 1666.843585][T17229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.853662][T17229] RIP: 0010:close_fs_devices.part.0+0x5fe/0x7f0 [ 1666.859911][T17229] Code: 3c 03 0f 8e da 01 00 00 48 8b 45 b8 c7 80 20 01 00 00 00 00 00 00 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f2 73 be fe <0f> 0b e8 eb 73 be fe 0f 0b e8 e4 73 be fe 0f 0b e9 16 ff ff ff e8 [ 1666.879527][T17229] RSP: 0018:ffff888063207798 EFLAGS: 00010246 [ 1666.885603][T17229] RAX: 0000000000040000 RBX: ffff8880924a55c0 RCX: ffffc90005f3d000 [ 1666.893577][T17229] RDX: 0000000000040000 RSI: ffffffff82b3b9de RDI: 0000000000000007 [ 1666.901545][T17229] RBP: ffff888063207810 R08: ffff888093260440 R09: ffffed1015d06af5 [ 1666.909512][T17229] R10: ffffed1015d06af4 R11: ffff8880ae8357a3 R12: 0000000000000000 [ 1666.917473][T17229] R13: ffff88809bc04900 R14: dffffc0000000000 R15: fffffffffffffff4 [ 1666.925429][T17229] FS: 00007fb5ecd41700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1666.934345][T17229] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1666.940919][T17229] CR2: 00007ffd25308fe8 CR3: 000000008b96a000 CR4: 00000000001406f0 [ 1666.948889][T17229] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1666.956854][T17229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1666.964806][T17229] Call Trace: [ 1666.968109][T17229] btrfs_close_devices+0xa0/0x200 [ 1666.973143][T17229] btrfs_mount_root+0xf49/0x1290 [ 1666.978082][T17229] ? btrfs_decode_error+0x70/0x70 10:05:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/129, 0x81}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/41, 0x29}, {0x0}], 0x2}, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/156, 0x9c}, {0x0}, {0x0}], 0x3) shutdown(r4, 0x0) r6 = dup(r2) shutdown(r6, 0x0) [ 1666.983093][T17229] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1666.989255][T17229] ? vfs_parse_fs_string+0x111/0x170 [ 1666.994553][T17229] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1667.000099][T17229] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1667.006089][T17229] ? __lookup_constant+0xd6/0x100 [ 1667.011123][T17229] ? security_fs_context_parse_param+0x81/0xb0 [ 1667.017296][T17229] ? logfc+0x700/0x700 [ 1667.020751][ T3891] kobject: 'loop4' (0000000002a7cd22): kobject_uevent_env [ 1667.021372][T17229] ? kfree+0x28b/0x2c0 [ 1667.032519][T17229] ? vfs_parse_fs_string+0x116/0x170 [ 1667.034844][ T3891] kobject: 'loop4' (0000000002a7cd22): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1667.037807][T17229] ? btrfs_decode_error+0x70/0x70 [ 1667.037826][T17229] legacy_get_tree+0x113/0x220 [ 1667.057715][T17229] vfs_get_tree+0x8f/0x380 [ 1667.062155][T17229] fc_mount+0x17/0xc0 [ 1667.066160][T17229] vfs_kern_mount.part.0+0xd8/0xf0 [ 1667.071279][T17229] vfs_kern_mount+0x40/0x60 [ 1667.075795][T17229] btrfs_mount+0x2b4/0x15d8 [ 1667.080311][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.086564][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.092816][T17229] ? debug_smp_processor_id+0x3c/0x214 [ 1667.098279][T17229] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1667.104444][T17229] ? btrfs_remount+0x10f0/0x10f0 [ 1667.109384][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.115610][T17229] ? refcount_sub_and_test_checked+0x154/0x200 [ 1667.121751][T17229] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1667.127110][T17229] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1667.133085][T17229] ? __lookup_constant+0xd6/0x100 [ 1667.138111][T17229] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1667.144077][T17229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1667.150308][T17229] ? apparmor_capable+0x2ed/0x630 [ 1667.155334][T17229] ? cap_capable+0x205/0x270 [ 1667.159944][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.166169][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.172409][T17229] ? btrfs_remount+0x10f0/0x10f0 [ 1667.177344][T17229] legacy_get_tree+0x113/0x220 [ 1667.182088][T17229] ? legacy_get_tree+0x113/0x220 [ 1667.187007][T17229] ? ns_capable_common+0x93/0x100 [ 1667.192012][T17229] vfs_get_tree+0x8f/0x380 [ 1667.196432][T17229] do_mount+0x13b3/0x1c30 [ 1667.200759][T17229] ? copy_mount_string+0x40/0x40 [ 1667.205688][T17229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1667.211908][T17229] ? _copy_from_user+0x12c/0x1a0 [ 1667.216834][T17229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.223063][T17229] ? copy_mount_options+0x2e8/0x3f0 [ 1667.228258][T17229] ksys_mount+0xdb/0x150 [ 1667.232500][T17229] __x64_sys_mount+0xbe/0x150 [ 1667.237180][T17229] do_syscall_64+0xfa/0x760 [ 1667.241673][T17229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1667.247545][T17229] RIP: 0033:0x45c2ca [ 1667.251420][T17229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1667.271005][T17229] RSP: 002b:00007fb5ecd40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:05:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_cmd={0x10}}) [ 1667.279413][T17229] RAX: ffffffffffffffda RBX: 00007fb5ecd40b40 RCX: 000000000045c2ca [ 1667.287367][T17229] RDX: 00007fb5ecd40ae0 RSI: 0000000020000100 RDI: 00007fb5ecd40b00 [ 1667.295336][T17229] RBP: 0000000000000001 R08: 00007fb5ecd40b40 R09: 00007fb5ecd40ae0 [ 1667.303321][T17229] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1667.311275][T17229] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 1667.319256][T17229] Modules linked in: [ 1667.329087][T17229] ---[ end trace 79dd0343f46eedd9 ]--- [ 1667.338467][T17229] RIP: 0010:close_fs_devices.part.0+0x5fe/0x7f0 [ 1667.346364][T17229] Code: 3c 03 0f 8e da 01 00 00 48 8b 45 b8 c7 80 20 01 00 00 00 00 00 00 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f2 73 be fe <0f> 0b e8 eb 73 be fe 0f 0b e8 e4 73 be fe 0f 0b e9 16 ff ff ff e8 [ 1667.367032][ T3891] kobject: 'loop0' (000000008be7bb88): kobject_uevent_env [ 1667.374615][T17229] RSP: 0018:ffff888063207798 EFLAGS: 00010246 [ 1667.381015][T17229] RAX: 0000000000040000 RBX: ffff8880924a55c0 RCX: ffffc90005f3d000 [ 1667.388926][ T3891] kobject: 'loop0' (000000008be7bb88): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1667.391182][T17229] RDX: 0000000000040000 RSI: ffffffff82b3b9de RDI: 0000000000000007 [ 1667.408555][T17229] RBP: ffff888063207810 R08: ffff888093260440 R09: ffffed1015d06af5 [ 1667.429479][T17229] R10: ffffed1015d06af4 R11: ffff8880ae8357a3 R12: 0000000000000000 [ 1667.444750][ T3891] kobject: 'loop3' (00000000c5321228): kobject_uevent_env [ 1667.447667][T17229] R13: ffff88809bc04900 R14: dffffc0000000000 R15: fffffffffffffff4 [ 1667.452121][ T3891] kobject: 'loop3' (00000000c5321228): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1667.461508][T17229] FS: 00007fb5ecd41700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1667.472112][ T3891] kobject: 'loop4' (0000000002a7cd22): kobject_uevent_env [ 1667.488001][T17229] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1667.498065][T17229] CR2: 0000000002119058 CR3: 000000008b96a000 CR4: 00000000001406e0 [ 1667.499106][ T3891] kobject: 'loop4' (0000000002a7cd22): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1667.512003][T17229] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1667.530333][ T3891] kobject: 'loop2' (00000000c0f7c80f): kobject_uevent_env [ 1667.537267][T17229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1667.548015][T17229] Kernel panic - not syncing: Fatal exception [ 1667.548160][ T3891] kobject: 'loop2' (00000000c0f7c80f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1667.555432][T17229] Kernel Offset: disabled [ 1667.569857][T17229] Rebooting in 86400 seconds..