79.968254][ T1551] loop_set_fd+0xb52/0x1020 [ 479.972851][ T1551] lo_ioctl+0x1a3/0x1460 [ 479.977096][ T1551] ? trace_hardirqs_on+0x67/0x240 [ 479.982125][ T1551] ? loop_set_fd+0x1020/0x1020 [ 479.987069][ T1551] blkdev_ioctl+0xedb/0x1c1a [ 479.991723][ T1551] ? blkpg_ioctl+0xa90/0xa90 [ 479.996319][ T1551] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 480.002134][ T1551] ? __kasan_check_read+0x11/0x20 [ 480.007165][ T1551] ? __kasan_check_read+0x11/0x20 [ 480.012204][ T1551] block_ioctl+0xee/0x130 [ 480.016531][ T1551] ? blkdev_fallocate+0x410/0x410 [ 480.021562][ T1551] do_vfs_ioctl+0xdb6/0x13e0 [ 480.026155][ T1551] ? ioctl_preallocate+0x210/0x210 [ 480.031647][ T1551] ? __fget+0x384/0x560 [ 480.035803][ T1551] ? ksys_dup3+0x3e0/0x3e0 [ 480.040228][ T1551] ? do_sys_open+0x31d/0x5d0 [ 480.044820][ T1551] ? tomoyo_file_ioctl+0x23/0x30 [ 480.049760][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.056006][ T1551] ? security_file_ioctl+0x8d/0xc0 [ 480.061121][ T1551] ksys_ioctl+0xab/0xd0 [ 480.065283][ T1551] __x64_sys_ioctl+0x73/0xb0 [ 480.069870][ T1551] do_syscall_64+0xfa/0x760 [ 480.074553][ T1551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.080446][ T1551] RIP: 0033:0x459697 [ 480.084518][ T1551] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.104214][ T1551] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.112627][ T1551] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 480.120600][ T1551] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 480.128693][ T1551] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 480.136662][ T1551] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 07:34:33 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000040)={'tunl0\x00', @ifru_addrs=@llc={0x1a, 0x33f, 0xfff, 0x4, 0x5, 0x5ce5c571, @dev={[], 0x1f}}}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f0000000000)={0x3, @bcast}) 07:34:33 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/dlm-control\x00', 0x208000, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000001600)=0x5b6, 0x2) ioctl$SIOCAX25GETUID(r0, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) [ 480.144638][ T1551] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x3f00000000000000, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:33 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x2) ioctl$RTC_UIE_OFF(r1, 0x7004) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SIOCAX25GETUID(r2, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r0}) 07:34:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x300}) [ 480.229120][ T1551] ISOFS: Unable to identify CD-ROM format. 07:34:33 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 480.342081][ T1660] loop1: p1 p2 < > p3 07:34:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x4000000000000000, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:33 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0xff, 0x2000) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='\x00', 0x8000, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="6668ce957423cf767156575bfc5c533b799f00ca6aeff21c58a9651f8652a807ca41bf461774fef561", 0x29, 0x9}, {&(0x7f00000000c0)="e3bc31b99d4d8f7fbdb7b1a0892fd72ebb2681ab6bf8df51b4b8b059eab095a0245dfba0c8aedd1431276f23142fb5cc3c07329843672e3c34f5d64a122a0306a459948f54be137bd28ea598f5f1198200e021e1225b5a461bb594a63d65d1f83d88e9c2ea9a001985774f4204b7d6a28034d1ed817465902c113a21a902132a477d558429e4fc357a3421544702d13030a4978f6bacdf43595feb01347b480436ad3faad511b75ac2ac08824ccc9aad80b027e3b28d8144f41ddc250b7c8d345bca1fbc863b9408676b3917a5aded8da04ede97ca5099ff191cd1231341da1abe4db02f17406a0f3e2019d2c3280b5894", 0xf1, 0xffffffffffff537a}], 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='nolazyt@\x00\x00\x00pquota,smackfsfloor=,context=staff_u,dont_measure,audit,smackfshat=/bdevkeyring,subj_type=,!]md5sum,fowner<', @ANYRESDEC=r2, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYBLOB="f04997aa7472d14a376f6f1f9d0a78ab952bf76fbc11d884742f5a739efdca3b602ab6badce4532097432b07f4c72ac91f47ab97f23bc73fbf50822642f37c3330cf14414a83d85b8bfd8295bbe225128c95b5fecb3dbbe75afe32f16862559ef1362c2a44db13013fdfdbded05c7541a711e89998caf85a950a4d0938c9ce997943702f7ad11314371a66643eb056e797e714920f5fbb4b6de64f191eb7e49ec5cb87348db2da90e65898bc7d0ff376c0868d83c85d107a6f1ae62d9f38471933dd5d90ab6f9f3419a2ec8dc0327991dc1d37d1832611ae44", @ANYRESDEC=r1, @ANYBLOB="f3eddc424163cf06d29e6b89dd4ff2215b8413bc95ded25ef52721716d806f9647b145f66fb75c573556f227324ae480fbd26bf305bb8d87dedeadd5f1954701945815926fd69650d4b634114a407dfe0c4dac2a206c11645bb8ed2e1a1f0fa81fa3718f9327b6fc60139885f7722420cbbf", @ANYRES16, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYBLOB="dec019d251376ac7b626ff68f0dd4bff8c15e306c6d4e8baab89d030dd65eb586c04b740616398242ea1316394acb0faf7c5691c78100dc1c879eb2fe65b2ea73f596fa497c6ff54fc1e9edb653fa97824774c3437ea3cb80e8b569647806b0c25f088e0508344875bb9665d5cbbf6ddef9776d663ac498e5ed44c7eecb097747e3ffaca324a5d201c783b9b0201282743fb8b7e8f388872c329e407183c7373b2125032976a4e7c6a22bc4f28dc1c69d5ca8293568ace35d8ec1f5fba933ff6e59ea5564bd576414ffa5092470646d22d058d941528bc64304e3911a72edeb7c8646968ce61b44ec9898cee73a22368f858d232985600ad195cb673f996", @ANYRES64, @ANYBLOB="6a626ab033f2d814a6b7accf08566baefd49a727", @ANYBLOB="74984a50e9fc565043317d8fc49ffea96774086cdf2097ced7880cfa8a5ff6e0f1b416d2f2ee73f999ec8c525744a0d5762d68f0e989656cfc3a4dc4cb92b806f9da983011db7a153d6a64148194228c9676235e3b689b312ff2391ddd525314fb68a9c52ea6bd31ef19d3dbc46071e883995315d624d52691b247dd6c80d8c4a881521a47df289a5149176c15249eb9cb60b0f9f183a68910b825ee16d97a9d2c6a0e09bca21ce4b671", @ANYRES64=r3, @ANYBLOB="01a72000285e2f817482a7fa6861a994f1f2de4399ab788181f16bfec7ff550bb012b8bc06ba86c4ece21d492c9be88216951390e868ee19", @ANYRES16=r2], @ANYRESHEX=r1]]) r4 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x5, 0x880) setsockopt$inet6_dccp_int(r4, 0x21, 0x4, &(0x7f00000003c0)=0x57, 0x4) pipe(&(0x7f00000002c0)) 07:34:33 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x100, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x8) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) prctl$PR_GET_SECUREBITS(0x1b) getpid() r2 = open(&(0x7f0000000080)='./file0\x00', 0x303200, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e21, 0x3, @mcast1, 0xb5df}, {0xa, 0x4e20, 0x7f, @remote, 0x1}, 0x340, [0x1bf, 0x401, 0x1, 0x0, 0x5, 0x0, 0x3ff, 0xfa]}, 0x5c) 07:34:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x500}) [ 480.423782][ T1791] FAULT_INJECTION: forcing a failure. [ 480.423782][ T1791] name failslab, interval 1, probability 0, space 0, times 0 [ 480.480857][ T1791] CPU: 1 PID: 1791 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 480.490028][ T1791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.500079][ T1791] Call Trace: [ 480.500109][ T1791] dump_stack+0x172/0x1f0 [ 480.500127][ T1791] should_fail.cold+0xa/0x15 [ 480.500143][ T1791] ? fault_create_debugfs_attr+0x180/0x180 [ 480.500158][ T1791] ? __kernel_text_address+0xd/0x40 [ 480.500178][ T1791] ? unwind_get_return_address+0x61/0xa0 [ 480.518243][ T1791] ? profile_setup.cold+0xbb/0xbb [ 480.518265][ T1791] ? ___might_sleep+0x163/0x280 [ 480.539540][ T1791] __should_failslab+0x121/0x190 [ 480.544492][ T1791] should_failslab+0x9/0x14 [ 480.549004][ T1791] __kmalloc+0x2e0/0x770 [ 480.553258][ T1791] ? mark_held_locks+0xf0/0xf0 [ 480.558022][ T1791] ? stack_trace_save+0xac/0xe0 [ 480.562882][ T1791] ? stack_trace_consume_entry+0x190/0x190 [ 480.568721][ T1791] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 480.568734][ T1791] tomoyo_realpath_from_path+0xcd/0x7b0 [ 480.568755][ T1791] ? tomoyo_path_number_perm+0x193/0x520 [ 480.586971][ T1791] tomoyo_path_number_perm+0x1dd/0x520 [ 480.592451][ T1791] ? tomoyo_path_number_perm+0x193/0x520 [ 480.598277][ T1791] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 480.604188][ T1791] ? __kasan_check_write+0x14/0x20 [ 480.609405][ T1791] ? quarantine_put+0x11c/0x1c0 [ 480.614263][ T1791] ? trace_hardirqs_on+0x67/0x240 [ 480.619283][ T1791] ? putname+0xef/0x130 [ 480.623437][ T1791] ? kmem_cache_free+0x1a7/0x320 [ 480.628382][ T1791] tomoyo_path_mkdir+0xaa/0xf0 [ 480.633161][ T1791] ? tomoyo_file_ioctl+0x30/0x30 [ 480.638098][ T1791] ? kern_path_mountpoint+0x40/0x40 [ 480.643309][ T1791] ? strncpy_from_user+0x2b4/0x400 [ 480.648442][ T1791] security_path_mkdir+0x113/0x170 [ 480.653560][ T1791] do_mkdirat+0x160/0x2a0 [ 480.657980][ T1791] ? __ia32_sys_mknod+0xb0/0xb0 [ 480.662847][ T1791] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 480.669180][ T1791] ? trace_hardirqs_off_caller+0x65/0x230 [ 480.674991][ T1791] __x64_sys_mkdir+0x5c/0x80 [ 480.679584][ T1791] do_syscall_64+0xfa/0x760 [ 480.684179][ T1791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.690067][ T1791] RIP: 0033:0x458c47 [ 480.693970][ T1791] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.713975][ T1791] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 480.722391][ T1791] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 07:34:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x104, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0046f) 07:34:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfeffffff00000000, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:34 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0xd2) bind$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7f, 0x404000) mkdirat(r2, &(0x7f0000000100)='./file0/file0\x00', 0x2) [ 480.730368][ T1791] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 480.738341][ T1791] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 480.746404][ T1791] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 480.754379][ T1791] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x600}) 07:34:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:34 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x100) accept4$tipc(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x80800) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x700}) [ 480.914948][ T1791] ERROR: Out of memory at tomoyo_realpath_from_path. [ 481.017010][ T1791] ISOFS: Unable to identify CD-ROM format. 07:34:34 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffffffffffff000, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x400a}) r1 = socket(0x2, 0x803, 0x1) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000400), &(0x7f0000000440)=0x4) recvmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/218, 0xda}], 0x1, &(0x7f0000000380)=""/73, 0x49}, 0x10000) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) write(r0, &(0x7f0000000340)="982d0670bdaa5729124d5b101495", 0xe) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x801, 0x40) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040)=0x839, 0x4) ioctl$SIOCAX25GETUID(r2, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) 07:34:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x3f00}) 07:34:34 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0xfffffffffffffb83, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[{0x70, 0x88, 0x2, "cf87e30ff9e42e8bdfc9a2afa26ea729459a1332460079b69ab3137442284cca5caf99f68e1ed135dae8f6b4b91f55cbd2d1456c722f497e0591523a6e860aa8ba3a63441d774a65493f51616ba7f84d87799e5824ede278fa23e8bf7c39414c"}, {0x30, 0x103, 0x20, "643054ba53e2a0da8f3e72260c09b092086adca928c461d005"}, {0xb8, 0x10f, 0x0, "6e56a364d837aad8448fc531b4d49193228b37b008e699dd2a02d846d6c4ae2951e7ffa92896fb9c409c014a2d5fe8252ba56dfb42ae38015b816c741ec6808fd88a319de471c377332f7c1066fb4a8ae114bc6b858d880321b5e8549a1834118f28c89322cfd8c5382d86ff1a35f3737488877a7c73af27ece687de5dde31bae4c71f713744ce29bda7f08816b1a6e85ad6267e5fd4031d670db37b5a8e89f21eaaacfbcb9eb3"}, {0x20, 0x113, 0x25, "49cb0f3a1e5584535a47e2b5f0ca065a"}, {0xa8, 0x84, 0x8, "f8e80dae4e59297a4f3c11e35f6c70a6ec55b3a4e47370cb4dcc330afdf4c755a9c02278f8ad2fb323f5355200bd272247138c12b891c373687669305f36d5e794aca1563d03d340d6dc6eb78efabc594f6a303caca023f63dcb32e674ee225dc89ed800492e120e8b963d4ef590b758744c5862467db02753c2139e08a6a58bd69fbf2ad1d49c85b9d59be8649365fe3e"}, {0xb0, 0x105, 0x4, "b616bdb384b6adbb18a58462c83c54b3c79c2d7f01b6ff6f60f9de7c9378784142951c1c2b71a9f2bda74361a8bf4a42e9b1b36c67d8fae7c161811302e60b83b0a665d5ccd3dda1640053988dcf88aa144bf2d0efd09965aebf8767ad0b7cfb40c0ed49e422e22af1afd5f8913ae015ca51fa7745ce2b0c1b54afc70fc42d63b1530bac36cd55854b42c3b5a94ab34381ed2a53bf9927ef2c95a8412c"}, {0xf8, 0x113, 0x6, "5cab57a98903f70db2bad7d5d857835d613205c543207bce64be9beaf0d04697801692c50f96e48d035630633a2f4104fda32e16726f3b1cbe1d9fa72b9fb97cb9445135062ead449b1d36ba96b015fb2e3b77f7d5aa192b4aea8a7079f8b5f036eea82cc54ae34f05f9747ac4e6046bb656e3aea121a2653d9fe0268453aaa723fbb10f31dfd815e5ed5f0915acf5b5a246d72f6bbb94d83c5aa9e5fb3d4d7b94656c4fea8435b8ce5f1dc8db7765f59b70c334d819d0ba5587c44a3e6545785814e2226faf5393925b591ff2a72dac415362367dfeb5382a692c7bf7e3d21bf4aa"}, {0x60, 0x11f, 0x50a, "51eaf511829a26cfdec0990e4fdcfafad75667b88bf7457f9485272b65adc4129c21b0e41a6a276145a7f160e87c456ee1531f6d9acb0a75a2fb57617633ec33ba76398061325937612e570285ebc420"}], 0x428}, 0x1) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0), 0x4) [ 481.186403][ T2037] FAULT_INJECTION: forcing a failure. [ 481.186403][ T2037] name failslab, interval 1, probability 0, space 0, times 0 [ 481.207941][ T2037] CPU: 1 PID: 2037 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 481.217058][ T2037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.227101][ T2037] Call Trace: [ 481.227131][ T2037] dump_stack+0x172/0x1f0 [ 481.227151][ T2037] should_fail.cold+0xa/0x15 [ 481.227165][ T2037] ? fault_create_debugfs_attr+0x180/0x180 [ 481.227178][ T2037] ? __kernel_text_address+0xd/0x40 [ 481.227192][ T2037] ? unwind_get_return_address+0x61/0xa0 [ 481.227205][ T2037] ? profile_setup.cold+0xbb/0xbb [ 481.227218][ T2037] ? ___might_sleep+0x163/0x280 [ 481.227238][ T2037] __should_failslab+0x121/0x190 [ 481.239418][ T2037] should_failslab+0x9/0x14 [ 481.239430][ T2037] __kmalloc+0x2e0/0x770 [ 481.239444][ T2037] ? mark_held_locks+0xf0/0xf0 [ 481.239466][ T2037] ? stack_trace_save+0xac/0xe0 [ 481.250440][ T2037] ? stack_trace_consume_entry+0x190/0x190 [ 481.250454][ T2037] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.250465][ T2037] tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.250479][ T2037] ? tomoyo_path_number_perm+0x193/0x520 [ 481.250496][ T2037] tomoyo_path_number_perm+0x1dd/0x520 [ 481.250508][ T2037] ? tomoyo_path_number_perm+0x193/0x520 [ 481.250526][ T2037] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 481.328771][ T2037] ? __kasan_check_write+0x14/0x20 [ 481.333899][ T2037] ? quarantine_put+0x11c/0x1c0 [ 481.338755][ T2037] ? trace_hardirqs_on+0x67/0x240 [ 481.343790][ T2037] ? putname+0xef/0x130 [ 481.348038][ T2037] ? kmem_cache_free+0x1a7/0x320 [ 481.352985][ T2037] tomoyo_path_mkdir+0xaa/0xf0 [ 481.357753][ T2037] ? tomoyo_file_ioctl+0x30/0x30 [ 481.362707][ T2037] ? kern_path_mountpoint+0x40/0x40 [ 481.367948][ T2037] ? strncpy_from_user+0x2b4/0x400 [ 481.373504][ T2037] security_path_mkdir+0x113/0x170 [ 481.378619][ T2037] do_mkdirat+0x160/0x2a0 [ 481.382951][ T2037] ? __ia32_sys_mknod+0xb0/0xb0 [ 481.387800][ T2037] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 481.393899][ T2037] ? trace_hardirqs_off_caller+0x65/0x230 [ 481.399624][ T2037] __x64_sys_mkdir+0x5c/0x80 [ 481.404227][ T2037] do_syscall_64+0xfa/0x760 [ 481.408836][ T2037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.414730][ T2037] RIP: 0033:0x458c47 [ 481.418626][ T2037] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.438321][ T2037] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 481.446740][ T2037] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 481.454715][ T2037] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 481.462690][ T2037] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 481.470671][ T2037] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 481.479594][ T2037] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 481.498569][ T2037] ERROR: Out of memory at tomoyo_realpath_from_path. [ 481.518972][ T2037] ISOFS: Unable to identify CD-ROM format. 07:34:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x4000}) 07:34:34 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xd, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) syz_open_dev$binder(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) listen(r1, 0x80) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) rt_sigsuspend(0x0, 0xffffffffffffffe2) pipe(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000200)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)=""/72, 0x48}], 0x2, &(0x7f00000003c0)=""/205, 0xcd}, 0x40000002) r3 = accept4(r1, 0x0, 0x0, 0x80000) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 07:34:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) 07:34:34 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 481.726698][ T2151] FAULT_INJECTION: forcing a failure. [ 481.726698][ T2151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.741322][ T2151] CPU: 1 PID: 2151 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 481.750348][ T2151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.760415][ T2151] Call Trace: [ 481.763735][ T2151] dump_stack+0x172/0x1f0 [ 481.768084][ T2151] should_fail.cold+0xa/0x15 [ 481.772698][ T2151] ? fault_create_debugfs_attr+0x180/0x180 [ 481.778525][ T2151] ? is_bpf_text_address+0xac/0x170 [ 481.783739][ T2151] ? __kasan_check_read+0x11/0x20 [ 481.788788][ T2151] ? __brelse+0x95/0xb0 [ 481.792956][ T2151] should_fail_alloc_page+0x50/0x60 [ 481.792973][ T2151] __alloc_pages_nodemask+0x1a1/0x900 [ 481.803540][ T2151] ? __bpf_address_lookup+0x310/0x310 [ 481.809032][ T2151] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 481.814781][ T2151] ? __alloc_pages_slowpath+0x2520/0x2520 [ 481.820529][ T2151] ? fault_create_debugfs_attr+0x180/0x180 07:34:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0xff00}) 07:34:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:35 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/72) [ 481.826353][ T2151] ? __kernel_text_address+0xd/0x40 [ 481.831609][ T2151] cache_grow_begin+0x90/0xd20 [ 481.831632][ T2151] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.842185][ T2151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.842201][ T2151] __kmalloc+0x6b2/0x770 [ 481.842216][ T2151] ? mark_held_locks+0xf0/0xf0 [ 481.842231][ T2151] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.842243][ T2151] tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.842265][ T2151] ? tomoyo_path_number_perm+0x193/0x520 07:34:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x80ffff}) [ 481.842280][ T2151] tomoyo_path_number_perm+0x1dd/0x520 [ 481.842291][ T2151] ? tomoyo_path_number_perm+0x193/0x520 [ 481.842307][ T2151] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 481.842324][ T2151] ? __kasan_check_write+0x14/0x20 [ 481.842345][ T2151] ? quarantine_put+0x11c/0x1c0 [ 481.842360][ T2151] ? trace_hardirqs_on+0x67/0x240 [ 481.842373][ T2151] ? putname+0xef/0x130 [ 481.842384][ T2151] ? kmem_cache_free+0x1a7/0x320 [ 481.842396][ T2151] tomoyo_path_mkdir+0xaa/0xf0 [ 481.842412][ T2151] ? tomoyo_file_ioctl+0x30/0x30 [ 481.927042][ T2151] ? kern_path_mountpoint+0x40/0x40 [ 481.927065][ T2151] ? strncpy_from_user+0x2b4/0x400 [ 481.937377][ T2151] security_path_mkdir+0x113/0x170 [ 481.942516][ T2151] do_mkdirat+0x160/0x2a0 [ 481.947034][ T2151] ? __ia32_sys_mknod+0xb0/0xb0 [ 481.947053][ T2151] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 481.947076][ T2151] ? trace_hardirqs_off_caller+0x65/0x230 [ 481.963787][ T2151] __x64_sys_mkdir+0x5c/0x80 [ 481.963807][ T2151] do_syscall_64+0xfa/0x760 [ 481.963824][ T2151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.963834][ T2151] RIP: 0033:0x458c47 [ 481.963847][ T2151] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.963854][ T2151] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 481.963865][ T2151] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 481.963890][ T2151] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 07:34:35 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/142) getrlimit(0x0, &(0x7f0000000100)) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x1000000}) 07:34:35 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x101, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x6, 0x800) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @null, r0}) [ 481.978891][ T2151] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 481.978900][ T2151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 481.978908][ T2151] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:35 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4f17, 0x100) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000100)={r0, 0x800}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r2, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 07:34:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x2000030e, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 482.168528][ T2151] ISOFS: Unable to identify CD-ROM format. 07:34:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x804000000050000}]}) r0 = syz_open_procfs$namespace(0x0, 0x0) sendmsg(r0, 0x0, 0x0) 07:34:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x2000000}) 07:34:36 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x40000) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f0000000140)=""/173, 0xad}, {&(0x7f0000000200)=""/46, 0x2e}], 0x4, &(0x7f0000000280)=""/118, 0x76}, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000080)={0x2}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x3a, 0xa87, 0x5, 0x8, 0x4, 0x81}) 07:34:36 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:36 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000340)={0x7, 0x1b, 0x1}, 0x7) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x9000a6}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1f8, r2, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x46f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffed}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff9d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xc74}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1d8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xcb765d1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x4}, 0x4080) ioctl$SIOCAX25GETUID(r0, 0x541b, &(0x7f00000019c0)={0x3, @bcast}) [ 482.826015][ T2394] FAULT_INJECTION: forcing a failure. [ 482.826015][ T2394] name failslab, interval 1, probability 0, space 0, times 0 [ 482.871195][ T2394] CPU: 0 PID: 2394 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 482.880265][ T2394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.880271][ T2394] Call Trace: [ 482.880301][ T2394] dump_stack+0x172/0x1f0 [ 482.897979][ T2394] should_fail.cold+0xa/0x15 [ 482.902584][ T2394] ? __kasan_check_read+0x11/0x20 [ 482.907629][ T2394] ? fault_create_debugfs_attr+0x180/0x180 [ 482.913460][ T2394] ? page_to_nid.part.0+0x20/0x20 [ 482.918600][ T2394] ? ___might_sleep+0x163/0x280 [ 482.918621][ T2394] __should_failslab+0x121/0x190 [ 482.928402][ T2394] should_failslab+0x9/0x14 [ 482.932909][ T2394] kmem_cache_alloc+0x2aa/0x710 [ 482.937769][ T2394] ? __d_lookup+0x42f/0x760 [ 482.942290][ T2394] ? lock_acquire+0x190/0x410 [ 482.946970][ T2394] ? lookup_dcache+0x23/0x140 [ 482.951641][ T2394] __d_alloc+0x2e/0x8c0 [ 482.951657][ T2394] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 482.951674][ T2394] d_alloc+0x4d/0x280 [ 482.965513][ T2394] __lookup_hash+0xcd/0x190 [ 482.970019][ T2394] filename_create+0x1a7/0x4f0 [ 482.970033][ T2394] ? kern_path_mountpoint+0x40/0x40 [ 482.970056][ T2394] ? strncpy_from_user+0x2b4/0x400 [ 482.985098][ T2394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.991353][ T2394] ? getname_flags+0x277/0x5b0 [ 482.996131][ T2394] do_mkdirat+0xb5/0x2a0 [ 483.000389][ T2394] ? __ia32_sys_mknod+0xb0/0xb0 [ 483.005251][ T2394] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 483.011505][ T2394] ? trace_hardirqs_off_caller+0x65/0x230 [ 483.017234][ T2394] __x64_sys_mkdir+0x5c/0x80 [ 483.021825][ T2394] do_syscall_64+0xfa/0x760 [ 483.026336][ T2394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.032247][ T2394] RIP: 0033:0x458c47 [ 483.036145][ T2394] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.055748][ T2394] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 483.055762][ T2394] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 07:34:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xf0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:36 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x541b, &(0x7f0000000100)={0x3, @null, r1}) modify_ldt$read(0x0, &(0x7f0000000000)=""/50, 0x32) 07:34:36 executing program 3: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r0, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) 07:34:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x3000000}) 07:34:36 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) [ 483.055770][ T2394] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 483.055783][ T2394] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 483.088181][ T2394] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 483.088189][ T2394] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 483.126239][ T26] audit: type=1804 audit(1565076876.404:34): pid=2615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir507701852/syzkaller.gc4jib/544/bus" dev="sda1" ino=17985 res=1 07:34:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x4000000}) [ 483.187886][ T26] audit: type=1804 audit(1565076876.444:35): pid=2615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir507701852/syzkaller.gc4jib/544/bus" dev="sda1" ino=17985 res=1 07:34:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{}, {r0}, {}, {r0}], 0x4, 0x8000000000049) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00516) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000002700)=[{&(0x7f0000000100)=""/169, 0xa9}, {0x0}, {0x0}, {0x0}], 0x375) shutdown(r2, 0x0) 07:34:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x3f00, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:36 executing program 3: [ 483.259671][ T26] audit: type=1804 audit(1565076876.444:36): pid=2615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir507701852/syzkaller.gc4jib/544/bus" dev="sda1" ino=17985 res=1 07:34:36 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x5000000}) 07:34:36 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000200)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r1}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r2, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f0000000040)=0x2) 07:34:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x4000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:36 executing program 3: 07:34:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x6000000}) 07:34:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xf000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 483.473202][ T2750] FAULT_INJECTION: forcing a failure. [ 483.473202][ T2750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.486648][ T2750] CPU: 0 PID: 2750 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 483.495681][ T2750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.505839][ T2750] Call Trace: [ 483.509145][ T2750] dump_stack+0x172/0x1f0 [ 483.513491][ T2750] should_fail.cold+0xa/0x15 [ 483.518091][ T2750] ? fault_create_debugfs_attr+0x180/0x180 [ 483.523899][ T2750] ? is_bpf_text_address+0xac/0x170 [ 483.529104][ T2750] ? __kasan_check_read+0x11/0x20 [ 483.534130][ T2750] ? __brelse+0x95/0xb0 [ 483.538291][ T2750] should_fail_alloc_page+0x50/0x60 [ 483.543492][ T2750] __alloc_pages_nodemask+0x1a1/0x900 [ 483.548951][ T2750] ? __bpf_address_lookup+0x310/0x310 [ 483.554318][ T2750] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 483.560035][ T2750] ? __alloc_pages_slowpath+0x2520/0x2520 [ 483.565759][ T2750] ? fault_create_debugfs_attr+0x180/0x180 [ 483.571598][ T2750] ? __kernel_text_address+0xd/0x40 [ 483.576800][ T2750] cache_grow_begin+0x90/0xd20 [ 483.581563][ T2750] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 483.587280][ T2750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 483.593524][ T2750] __kmalloc+0x6b2/0x770 [ 483.597771][ T2750] ? mark_held_locks+0xf0/0xf0 [ 483.602542][ T2750] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 483.608262][ T2750] tomoyo_realpath_from_path+0xcd/0x7b0 [ 483.613808][ T2750] ? tomoyo_path_number_perm+0x193/0x520 [ 483.619444][ T2750] tomoyo_path_number_perm+0x1dd/0x520 [ 483.624900][ T2750] ? tomoyo_path_number_perm+0x193/0x520 [ 483.630546][ T2750] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 483.636364][ T2750] ? __kasan_check_write+0x14/0x20 [ 483.641495][ T2750] ? quarantine_put+0x11c/0x1c0 [ 483.646352][ T2750] ? trace_hardirqs_on+0x67/0x240 [ 483.651375][ T2750] ? putname+0xef/0x130 [ 483.655528][ T2750] ? kmem_cache_free+0x1a7/0x320 [ 483.660473][ T2750] tomoyo_path_mkdir+0xaa/0xf0 [ 483.665240][ T2750] ? tomoyo_file_ioctl+0x30/0x30 [ 483.670352][ T2750] ? kern_path_mountpoint+0x40/0x40 [ 483.675552][ T2750] ? strncpy_from_user+0x2b4/0x400 [ 483.680678][ T2750] security_path_mkdir+0x113/0x170 [ 483.685880][ T2750] do_mkdirat+0x160/0x2a0 [ 483.690218][ T2750] ? __ia32_sys_mknod+0xb0/0xb0 [ 483.695076][ T2750] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 483.701149][ T2750] ? trace_hardirqs_off_caller+0x65/0x230 [ 483.706906][ T2750] __x64_sys_mkdir+0x5c/0x80 [ 483.711501][ T2750] do_syscall_64+0xfa/0x760 [ 483.716194][ T2750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.722084][ T2750] RIP: 0033:0x458c47 [ 483.725978][ T2750] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.747353][ T2750] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 483.755785][ T2750] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 483.763870][ T2750] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 07:34:37 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'dummy0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x37, 0x8, 0x1, [0x1, 0x3ff, 0x4]}}) [ 483.771841][ T2750] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 483.779811][ T2750] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 483.787776][ T2750] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:37 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="3a88534a97a8762a515dec93baf4a98161978016c750ae029bc63789b59ee60ceccefa40735c25107d52d18753b4bc561d382db5fa9b13904eb446a314ad0d07131c48d1acee0e0aecf516dd1bb340d0bde4794e1392eae89f3612b0e10096c79414a50ccd", 0x65}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 483.901410][ T2750] ISOFS: Unable to identify CD-ROM format. 07:34:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) 07:34:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x8000a0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x7000000}) 07:34:37 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80001, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x1, 0x800) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="0a000000000000007f0b0000000000000000000000000000fd0a000000000000000000000000000065030000000000000400000000000000ed020000000000000800000000000000df0e0000000000000800000000000000600a00000000000003000000000000000d060000000000000101000000000000dc0100000000000006000000000000007509000000000000e616000000000000990000400000000007000000000000001d9e95af618c61696bbe77e1e1bc3b876c377149abb94f782ec851dfa898a4a38daf705f37998154ef3d0d3c44da50"]) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x200000000000000}, 0x4) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000100)={0x7, 0x0, [{0x0, 0x0, 0xf708}, {0x2bc, 0x0, 0x7fff}, {0x9b0, 0x0, 0x6}, {0x85a, 0x0, 0x6}, {0xbef, 0x0, 0x2}, {0xc0011777, 0x0, 0x6}, {0x3ff, 0x0, 0x83}]}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r2, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)) 07:34:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000000)=""/114, 0x72}, {0x0}, {0x0}], 0x3}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) ppoll(0x0, 0x0, &(0x7f00000000c0)={0x70}, &(0x7f0000000100), 0x8) shutdown(r1, 0x0) 07:34:37 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x8000000}) [ 484.197646][ T2772] FAULT_INJECTION: forcing a failure. [ 484.197646][ T2772] name failslab, interval 1, probability 0, space 0, times 0 [ 484.262639][ T2772] CPU: 1 PID: 2772 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 484.271721][ T2772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.281765][ T2772] Call Trace: [ 484.285053][ T2772] dump_stack+0x172/0x1f0 [ 484.289466][ T2772] should_fail.cold+0xa/0x15 [ 484.294064][ T2772] ? fault_create_debugfs_attr+0x180/0x180 [ 484.299860][ T2772] ? ___might_sleep+0x163/0x280 [ 484.304723][ T2772] __should_failslab+0x121/0x190 [ 484.309644][ T2772] should_failslab+0x9/0x14 [ 484.314128][ T2772] __kmalloc+0x2e0/0x770 [ 484.318352][ T2772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.324579][ T2772] ? d_absolute_path+0x11b/0x170 [ 484.329498][ T2772] ? __d_path+0x140/0x140 [ 484.334086][ T2772] ? tomoyo_encode2.part.0+0xf5/0x400 [ 484.339439][ T2772] tomoyo_encode2.part.0+0xf5/0x400 [ 484.344628][ T2772] tomoyo_encode+0x2b/0x50 [ 484.349026][ T2772] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 484.354652][ T2772] tomoyo_path_number_perm+0x1dd/0x520 [ 484.360097][ T2772] ? tomoyo_path_number_perm+0x193/0x520 [ 484.365718][ T2772] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 484.371509][ T2772] ? __kasan_check_write+0x14/0x20 [ 484.376617][ T2772] ? quarantine_put+0x11c/0x1c0 [ 484.381450][ T2772] ? trace_hardirqs_on+0x67/0x240 [ 484.386454][ T2772] ? putname+0xef/0x130 [ 484.390610][ T2772] ? kmem_cache_free+0x1a7/0x320 [ 484.395530][ T2772] tomoyo_path_mkdir+0xaa/0xf0 [ 484.400274][ T2772] ? tomoyo_file_ioctl+0x30/0x30 [ 484.405208][ T2772] ? kern_path_mountpoint+0x40/0x40 [ 484.410389][ T2772] ? strncpy_from_user+0x2b4/0x400 [ 484.415480][ T2772] security_path_mkdir+0x113/0x170 [ 484.420575][ T2772] do_mkdirat+0x160/0x2a0 [ 484.424889][ T2772] ? __ia32_sys_mknod+0xb0/0xb0 [ 484.429723][ T2772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 484.435772][ T2772] ? trace_hardirqs_off_caller+0x65/0x230 [ 484.441560][ T2772] __x64_sys_mkdir+0x5c/0x80 [ 484.446132][ T2772] do_syscall_64+0xfa/0x760 [ 484.450619][ T2772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.456492][ T2772] RIP: 0033:0x458c47 [ 484.460461][ T2772] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.480050][ T2772] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 484.488532][ T2772] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 484.496487][ T2772] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 484.504442][ T2772] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 07:34:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xf0ffff, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:37 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0xfff, 0x4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe(&(0x7f0000000040)) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) [ 484.512402][ T2772] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 484.520375][ T2772] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x3f000000}) 07:34:37 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r0, 0x80000080044dfb, &(0x7f0000000100)) 07:34:37 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000040)={{0xffffffff}, 'port0\x00', 0x20, 0x1006, 0x2, 0x8000, 0x7, 0x0, 0x80, 0x0, 0x6, 0x209}) 07:34:37 executing program 1: 07:34:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x40000000}) 07:34:38 executing program 3: 07:34:38 executing program 1: 07:34:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0xff000000}) [ 484.897784][ T2772] ERROR: Out of memory at tomoyo_realpath_from_path. [ 484.926415][ T2772] ISOFS: Unable to identify CD-ROM format. 07:34:38 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x6, 0x1000}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x1000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:38 executing program 3: 07:34:38 executing program 1: 07:34:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0xffff8000}) 07:34:38 executing program 3: 07:34:38 executing program 1: 07:34:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x80ffff00000000}) 07:34:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 485.099072][ T2919] FAULT_INJECTION: forcing a failure. [ 485.099072][ T2919] name failslab, interval 1, probability 0, space 0, times 0 [ 485.114308][ T2919] CPU: 0 PID: 2919 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 485.123357][ T2919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.133429][ T2919] Call Trace: [ 485.133459][ T2919] dump_stack+0x172/0x1f0 [ 485.133486][ T2919] should_fail.cold+0xa/0x15 [ 485.133502][ T2919] ? fault_create_debugfs_attr+0x180/0x180 [ 485.133528][ T2919] ? page_to_nid.part.0+0x20/0x20 [ 485.156540][ T2919] ? ___might_sleep+0x163/0x280 [ 485.161401][ T2919] __should_failslab+0x121/0x190 [ 485.166515][ T2919] should_failslab+0x9/0x14 [ 485.171019][ T2919] __kmalloc_track_caller+0x2dc/0x760 [ 485.176395][ T2919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 485.182639][ T2919] ? strndup_user+0x77/0xd0 [ 485.187149][ T2919] memdup_user+0x26/0xb0 [ 485.191414][ T2919] strndup_user+0x77/0xd0 [ 485.195749][ T2919] ksys_mount+0x7b/0x150 [ 485.195763][ T2919] __x64_sys_mount+0xbe/0x150 [ 485.195783][ T2919] do_syscall_64+0xfa/0x760 [ 485.209265][ T2919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.215158][ T2919] RIP: 0033:0x45c27a [ 485.219052][ T2919] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 485.219059][ T2919] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:34:38 executing program 1: 07:34:38 executing program 3: [ 485.247685][ T2919] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 485.255662][ T2919] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 485.263637][ T2919] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 485.271604][ T2919] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 485.271611][ T2919] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:38 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:38 executing program 3: 07:34:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x200c0) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x2) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:38 executing program 1: 07:34:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x3f000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x100000000000000}) 07:34:38 executing program 3: 07:34:38 executing program 1: poll(&(0x7f0000001180), 0x22cf, 0x4f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xd14, 0x0, 0x0, 0x800e00481) readv(r0, &(0x7f0000001380)=[{&(0x7f00000010c0)=""/149, 0x95}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r0, 0x0) 07:34:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x200000000000000}) 07:34:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x40000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r1, 0x16, 0x2}, 0x10) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-control\x00', 0x100, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="02002cbadb0522dbdf251000000008000600000400003dfc965e41c080935c84ba4a87e1454396b20a59e41523fef0cdbeff42b0642929195794a989e42feec4dfc1538e87921eacc5ecab8df0e9323899986ef92ea64b5b098a2016db975e26495a15928453f48b9e322cf35c2d86555e157a4855daa96ec045ac663120a95d3a33aabaf7ca49a914e8e43ec47545ad4660ffce004ff222e834cdbe42600eb6ea3779f6ca9c87683b3a5e845f05d338a94f46680964100c0e84b2c60be84f0d7fe2609a487a2f26fc6b9b0000000000000000"], 0x1c}}, 0x20008000) [ 485.470173][ T2942] FAULT_INJECTION: forcing a failure. [ 485.470173][ T2942] name failslab, interval 1, probability 0, space 0, times 0 [ 485.519536][ T2942] CPU: 0 PID: 2942 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 485.528618][ T2942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.538689][ T2942] Call Trace: [ 485.541996][ T2942] dump_stack+0x172/0x1f0 [ 485.546344][ T2942] should_fail.cold+0xa/0x15 [ 485.550951][ T2942] ? fault_create_debugfs_attr+0x180/0x180 [ 485.556765][ T2942] ? __kasan_check_write+0x14/0x20 [ 485.561886][ T2942] ? ___might_sleep+0x163/0x280 [ 485.566752][ T2942] __should_failslab+0x121/0x190 [ 485.571697][ T2942] ? ratelimit_state_init+0xb0/0xb0 [ 485.576905][ T2942] should_failslab+0x9/0x14 [ 485.581412][ T2942] kmem_cache_alloc+0x2aa/0x710 [ 485.586313][ T2942] ? __kasan_check_read+0x11/0x20 [ 485.591441][ T2942] ? ratelimit_state_init+0xb0/0xb0 [ 485.596643][ T2942] ext4_alloc_inode+0x1f/0x640 [ 485.601417][ T2942] ? ratelimit_state_init+0xb0/0xb0 [ 485.606626][ T2942] alloc_inode+0x68/0x1e0 [ 485.610968][ T2942] new_inode_pseudo+0x19/0xf0 [ 485.615647][ T2942] new_inode+0x1f/0x40 [ 485.615663][ T2942] __ext4_new_inode+0x3d5/0x4e50 [ 485.615688][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.624668][ T2942] ? __dquot_initialize+0x525/0xd80 [ 485.624685][ T2942] ? ext4_free_inode+0x1490/0x1490 [ 485.624706][ T2942] ? dqget+0x10d0/0x10d0 [ 485.636111][ T2942] ? quarantine_put+0x11c/0x1c0 [ 485.636127][ T2942] ext4_mkdir+0x3df/0xe20 [ 485.636145][ T2942] ? ext4_init_dot_dotdot+0x520/0x520 [ 485.645471][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.645485][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.645500][ T2942] ? security_inode_permission+0xcb/0x100 [ 485.645517][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.654668][ T2942] ? security_inode_mkdir+0xe4/0x120 [ 485.654687][ T2942] vfs_mkdir+0x42e/0x670 [ 485.654705][ T2942] do_mkdirat+0x234/0x2a0 [ 485.666277][ T2942] ? __ia32_sys_mknod+0xb0/0xb0 [ 485.666297][ T2942] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 485.666319][ T2942] ? trace_hardirqs_off_caller+0x65/0x230 [ 485.714849][ T2942] __x64_sys_mkdir+0x5c/0x80 [ 485.719448][ T2942] do_syscall_64+0xfa/0x760 [ 485.723953][ T2942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.729847][ T2942] RIP: 0033:0x458c47 [ 485.733744][ T2942] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.754885][ T2942] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 07:34:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x300000000000000}) [ 485.763308][ T2942] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 485.771277][ T2942] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 485.779246][ T2942] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 485.787218][ T2942] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 485.795188][ T2942] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:39 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:39 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x20) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=@routing={0x2f, 0x4, 0x1, 0x80, 0x0, [@mcast2, @ipv4={[], [], @broadcast}]}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x80011, r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r3}) 07:34:39 executing program 3: 07:34:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x400000000000000}) 07:34:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xa0008000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfeffffff, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:39 executing program 3: 07:34:39 executing program 1: 07:34:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x500000000000000}) 07:34:39 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x5, 0x0, "1d0436a27f023c4f1b4e7a235f1b42a708f63d8e0052fd5383d43b5b2b6828fe7b26dc0cc76b82c7e76cac7b8cb320b0c131c5c1638bb4b6185dbe9d3cda39441c3fe074c009da2afb189d48cd1c369f"}, 0xd8) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) [ 486.008642][ T2971] FAULT_INJECTION: forcing a failure. [ 486.008642][ T2971] name failslab, interval 1, probability 0, space 0, times 0 07:34:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffff000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x600000000000000}) [ 486.103845][ T2971] CPU: 0 PID: 2971 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 486.112935][ T2971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.123436][ T2971] Call Trace: [ 486.134998][ T2971] dump_stack+0x172/0x1f0 [ 486.139329][ T2971] should_fail.cold+0xa/0x15 [ 486.143908][ T2971] ? arch_stack_walk+0x97/0xf0 [ 486.148750][ T2971] ? fault_create_debugfs_attr+0x180/0x180 [ 486.154539][ T2971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 486.160762][ T2971] ? ___might_sleep+0x163/0x280 [ 486.165691][ T2971] __should_failslab+0x121/0x190 [ 486.170615][ T2971] should_failslab+0x9/0x14 [ 486.175101][ T2971] __kmalloc+0x2e0/0x770 [ 486.179325][ T2971] ? __getblk_gfp+0x58/0xe00 [ 486.183897][ T2971] ? map_id_up+0x19c/0x320 [ 486.188298][ T2971] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 486.194001][ T2971] ? ext4_find_extent+0x76e/0x9d0 [ 486.199009][ T2971] ext4_find_extent+0x76e/0x9d0 [ 486.203848][ T2971] ? ___might_sleep+0x163/0x280 [ 486.208698][ T2971] ext4_ext_map_blocks+0x1dc/0x5040 [ 486.213965][ T2971] ? __kasan_check_read+0x11/0x20 [ 486.218985][ T2971] ? ext4_ext_release+0x10/0x10 [ 486.223825][ T2971] ? __kasan_check_write+0x14/0x20 [ 486.228920][ T2971] ? down_read+0x10a/0x3f0 [ 486.233338][ T2971] ? down_read_killable+0x460/0x460 [ 486.238539][ T2971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 486.244761][ T2971] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 486.250205][ T2971] ext4_map_blocks+0xdc5/0x17f0 [ 486.255129][ T2971] ? ext4_issue_zeroout+0x190/0x190 [ 486.260315][ T2971] ? ext4_set_acl+0x4f0/0x4f0 [ 486.264976][ T2971] ? __kasan_check_write+0x14/0x20 [ 486.270071][ T2971] ext4_getblk+0xc4/0x570 [ 486.274390][ T2971] ? ext4_iomap_begin+0x1000/0x1000 [ 486.279573][ T2971] ext4_bread+0x93/0x270 [ 486.283801][ T2971] ? ext4_getblk+0x570/0x570 [ 486.288380][ T2971] ext4_append+0x155/0x370 [ 486.292780][ T2971] ext4_mkdir+0x632/0xe20 [ 486.297097][ T2971] ? ext4_init_dot_dotdot+0x520/0x520 [ 486.302449][ T2971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.308673][ T2971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.314909][ T2971] ? security_inode_permission+0xcb/0x100 [ 486.320609][ T2971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.326831][ T2971] ? security_inode_mkdir+0xe4/0x120 [ 486.332108][ T2971] vfs_mkdir+0x42e/0x670 [ 486.336337][ T2971] do_mkdirat+0x234/0x2a0 [ 486.340649][ T2971] ? __ia32_sys_mknod+0xb0/0xb0 [ 486.345483][ T2971] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 486.351531][ T2971] ? trace_hardirqs_off_caller+0x65/0x230 [ 486.357242][ T2971] __x64_sys_mkdir+0x5c/0x80 [ 486.361832][ T2971] do_syscall_64+0xfa/0x760 [ 486.366320][ T2971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.372194][ T2971] RIP: 0033:0x458c47 [ 486.376081][ T2971] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.395679][ T2971] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 486.404070][ T2971] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 486.412021][ T2971] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 486.419990][ T2971] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 486.427949][ T2971] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 486.435909][ T2971] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 486.543336][ T2971] ISOFS: Unable to identify CD-ROM format. 07:34:39 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:39 executing program 3: 07:34:39 executing program 1: 07:34:39 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x0) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000140)) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x53, 0x18800) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000280)={0x1, 'veth0_to_team\x00', 0x4}, 0x18) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000001c0)=@ccm_128={{0x304}, "68b46dfabcb76119", "866929e36a143f4a7a6560912649e9f8", "0fe30261", "ce4e98536f0ddea0"}, 0x28) ioctl$SIOCAX25GETUID(r3, 0x89ea, &(0x7f0000000000)={0x3, @bcast, r1}) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c000000520020002abd7000fddbdf2500000005000200000008000600b9b200000800050909000000fd002136a2a3414f0acbb95618da73100722e951c8b407fb43504e9c2f78f42a439297de540341a518444e91b812878f43a6ecac5053786f2e5e3c1246ad93dd554c9dc9ea3b6eb455520849a7d7fcf1958008919a48a8d8600fb681624c109080955fca7895f66f7725c0328b03a83b46f26afa069952d22917edb7d477b26453d7a7527c3b733d3ec78b9e7daa1e1ef54bc393a1138a28403e59097985ea4b0b1a5b20f3989be4a8d8a3"], 0x1}}, 0x0) 07:34:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x700000000000000}) 07:34:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffe, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:39 executing program 1: 07:34:40 executing program 3: 07:34:40 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x3ffd, 0x0) getsockopt$ax25_int(r1, 0x101, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:34:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x800000000000000}) 07:34:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x8000a0ffffffff, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:40 executing program 3: [ 486.975293][ T3011] FAULT_INJECTION: forcing a failure. [ 486.975293][ T3011] name failslab, interval 1, probability 0, space 0, times 0 [ 486.991226][ T3011] CPU: 1 PID: 3011 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 487.000277][ T3011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.010328][ T3011] Call Trace: [ 487.013631][ T3011] dump_stack+0x172/0x1f0 [ 487.018141][ T3011] should_fail.cold+0xa/0x15 [ 487.022736][ T3011] ? fault_create_debugfs_attr+0x180/0x180 [ 487.028548][ T3011] ? page_to_nid.part.0+0x20/0x20 [ 487.033667][ T3011] ? ___might_sleep+0x163/0x280 [ 487.038525][ T3011] __should_failslab+0x121/0x190 [ 487.043469][ T3011] should_failslab+0x9/0x14 [ 487.047971][ T3011] kmem_cache_alloc_trace+0x2d3/0x790 [ 487.053347][ T3011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.059584][ T3011] ? _copy_from_user+0x12c/0x1a0 [ 487.064521][ T3011] copy_mount_options+0x5c/0x3f0 [ 487.069464][ T3011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.075708][ T3011] ksys_mount+0xa7/0x150 [ 487.079967][ T3011] __x64_sys_mount+0xbe/0x150 [ 487.084654][ T3011] do_syscall_64+0xfa/0x760 [ 487.089184][ T3011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.095068][ T3011] RIP: 0033:0x45c27a [ 487.098968][ T3011] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 487.118569][ T3011] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.127069][ T3011] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 487.135039][ T3011] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 487.143011][ T3011] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 487.150975][ T3011] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 487.158943][ T3011] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:40 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x3f00000000000000}) 07:34:40 executing program 1: 07:34:40 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r1 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000000)) 07:34:40 executing program 3: 07:34:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xf0ffffffffffff, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:40 executing program 3: 07:34:40 executing program 1: 07:34:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x100000000000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x4000000000000000}) 07:34:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x8, 0xcf) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r1}) 07:34:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0xff00000000000000}) [ 487.441673][ T3027] FAULT_INJECTION: forcing a failure. [ 487.441673][ T3027] name failslab, interval 1, probability 0, space 0, times 0 [ 487.501193][ T3027] CPU: 0 PID: 3027 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 487.510286][ T3027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.520339][ T3027] Call Trace: [ 487.523719][ T3027] dump_stack+0x172/0x1f0 [ 487.528042][ T3027] should_fail.cold+0xa/0x15 [ 487.532616][ T3027] ? fault_create_debugfs_attr+0x180/0x180 [ 487.538496][ T3027] ? lock_downgrade+0x920/0x920 [ 487.543328][ T3027] ? ___might_sleep+0x163/0x280 [ 487.548165][ T3027] __should_failslab+0x121/0x190 [ 487.553120][ T3027] should_failslab+0x9/0x14 [ 487.557607][ T3027] kmem_cache_alloc+0x2aa/0x710 [ 487.562448][ T3027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 487.568676][ T3027] ? __mark_inode_dirty+0x3d1/0x1390 [ 487.573947][ T3027] ext4_mb_new_blocks+0x5b9/0x3870 [ 487.579042][ T3027] ? quarantine_put+0x11c/0x1c0 [ 487.583874][ T3027] ? ext4_find_extent+0x76e/0x9d0 [ 487.588885][ T3027] ext4_ext_map_blocks+0x2b34/0x5040 [ 487.594162][ T3027] ? ext4_ext_release+0x10/0x10 [ 487.598996][ T3027] ? lock_acquire+0x190/0x410 [ 487.603660][ T3027] ? ext4_map_blocks+0x4b1/0x17f0 [ 487.608680][ T3027] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 487.614129][ T3027] ext4_map_blocks+0x529/0x17f0 [ 487.618969][ T3027] ? ext4_issue_zeroout+0x190/0x190 [ 487.624168][ T3027] ? ext4_set_acl+0x4f0/0x4f0 [ 487.628830][ T3027] ? __kasan_check_write+0x14/0x20 [ 487.633926][ T3027] ext4_getblk+0xc4/0x570 [ 487.638356][ T3027] ? ext4_iomap_begin+0x1000/0x1000 [ 487.643545][ T3027] ext4_bread+0x93/0x270 [ 487.647789][ T3027] ? ext4_getblk+0x570/0x570 [ 487.652368][ T3027] ext4_append+0x155/0x370 [ 487.656865][ T3027] ext4_mkdir+0x632/0xe20 [ 487.661182][ T3027] ? ext4_init_dot_dotdot+0x520/0x520 [ 487.666536][ T3027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.672762][ T3027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.678990][ T3027] ? security_inode_permission+0xcb/0x100 [ 487.684703][ T3027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.690926][ T3027] ? security_inode_mkdir+0xe4/0x120 [ 487.696195][ T3027] vfs_mkdir+0x42e/0x670 [ 487.700424][ T3027] do_mkdirat+0x234/0x2a0 [ 487.704744][ T3027] ? __ia32_sys_mknod+0xb0/0xb0 [ 487.709589][ T3027] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 487.715643][ T3027] ? trace_hardirqs_off_caller+0x65/0x230 [ 487.721436][ T3027] __x64_sys_mkdir+0x5c/0x80 [ 487.726011][ T3027] do_syscall_64+0xfa/0x760 [ 487.730499][ T3027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.737875][ T3027] RIP: 0033:0x458c47 [ 487.741758][ T3027] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.761430][ T3027] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 487.769822][ T3027] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 487.777779][ T3027] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 487.785738][ T3027] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 487.793696][ T3027] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 487.801649][ T3027] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:41 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:41 executing program 1: 07:34:41 executing program 3: 07:34:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x201, 0x1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80180, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000040)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:41 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x141000, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r0}) 07:34:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x200000000000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:41 executing program 3: 07:34:41 executing program 1: 07:34:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000100)={0x1, @empty, 0x4e23, 0x2, 'dh\x00', 0x10, 0x2, 0x2}, 0x2c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x1ff, 0x3, 0x0, 0x8}) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe(&(0x7f0000000140)) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x8, 0x103, 0x3, {0x100000000, 0x20, 0x0, 0x80000000}}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x3f00000000000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:41 executing program 3: [ 488.224745][ T3054] FAULT_INJECTION: forcing a failure. [ 488.224745][ T3054] name failslab, interval 1, probability 0, space 0, times 0 [ 488.238133][ T3054] CPU: 1 PID: 3054 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 488.247154][ T3054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.257212][ T3054] Call Trace: [ 488.260520][ T3054] dump_stack+0x172/0x1f0 [ 488.264862][ T3054] should_fail.cold+0xa/0x15 [ 488.269456][ T3054] ? fault_create_debugfs_attr+0x180/0x180 [ 488.275276][ T3054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 488.281003][ T3054] ? __es_tree_search.isra.0+0x1bf/0x230 [ 488.286646][ T3054] __should_failslab+0x121/0x190 [ 488.291592][ T3054] should_failslab+0x9/0x14 [ 488.291603][ T3054] kmem_cache_alloc+0x47/0x710 [ 488.291617][ T3054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 488.291630][ T3054] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 488.291640][ T3054] ? __es_shrink+0xad0/0xad0 [ 488.291652][ T3054] ? do_raw_write_lock+0x124/0x290 [ 488.291668][ T3054] __es_insert_extent+0x2cc/0xf20 [ 488.301347][ T3054] ext4_es_insert_extent+0x2d0/0xa70 [ 488.301361][ T3054] ? ext4_es_scan_clu+0x50/0x50 [ 488.301375][ T3054] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 488.301398][ T3054] ext4_map_blocks+0x7eb/0x17f0 [ 488.357456][ T3054] ? ext4_issue_zeroout+0x190/0x190 [ 488.362663][ T3054] ? ext4_set_acl+0x4f0/0x4f0 [ 488.367442][ T3054] ? __kasan_check_write+0x14/0x20 [ 488.372571][ T3054] ext4_getblk+0xc4/0x570 [ 488.377003][ T3054] ? ext4_iomap_begin+0x1000/0x1000 [ 488.382393][ T3054] ext4_bread+0x93/0x270 [ 488.386821][ T3054] ? ext4_getblk+0x570/0x570 [ 488.391420][ T3054] ext4_append+0x155/0x370 [ 488.395846][ T3054] ext4_mkdir+0x632/0xe20 [ 488.400181][ T3054] ? ext4_init_dot_dotdot+0x520/0x520 [ 488.405570][ T3054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.411812][ T3054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.418095][ T3054] ? security_inode_permission+0xcb/0x100 [ 488.423932][ T3054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.430176][ T3054] ? security_inode_mkdir+0xe4/0x120 [ 488.435468][ T3054] vfs_mkdir+0x42e/0x670 [ 488.439722][ T3054] do_mkdirat+0x234/0x2a0 [ 488.444055][ T3054] ? __ia32_sys_mknod+0xb0/0xb0 [ 488.450748][ T3054] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 488.457342][ T3054] ? trace_hardirqs_off_caller+0x65/0x230 [ 488.463201][ T3054] __x64_sys_mkdir+0x5c/0x80 [ 488.467796][ T3054] do_syscall_64+0xfa/0x760 [ 488.472308][ T3054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.478294][ T3054] RIP: 0033:0x458c47 [ 488.483463][ T3054] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.504296][ T3054] RSP: 002b:00007fd42d531a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 488.512715][ T3054] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 488.520688][ T3054] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 488.528656][ T3054] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 488.536626][ T3054] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 488.544597][ T3054] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 488.567056][ T3054] ISOFS: Unable to identify CD-ROM format. 07:34:41 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:41 executing program 1: unlink(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x9, 0x0) syz_open_dev$midi(0x0, 0x8001, 0x20000) unshare(0x40000000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0x0) 07:34:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x4000000000000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x80000}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:41 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'syzkaller0\x00', {0x2, 0x4e21}}) 07:34:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000340)) r1 = syz_open_pts(r0, 0x0) sched_setaffinity(0x0, 0x241, &(0x7f0000000100)=0x2d) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x0, 0xa75be187fbfd8282) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, @ioapic={0x10000, 0x0, 0x6ef, 0x0, 0x0, [{0xfffffffffffffffc, 0x3, 0x0, [], 0x4}, {0x9, 0x2, 0x0, [], 0x1}, {0x0, 0x0, 0x1, [], 0x8001}, {0x80, 0x7fff, 0x10000, [], 0x6}, {0xffffffffffffffff, 0xd73, 0x1}, {0x3, 0x5, 0x3ff}, {}, {0xa36, 0x0, 0x8, [], 0x7fffffff}, {0x0, 0x800, 0x0, [], 0x35636c5a}, {0x6, 0x9, 0x7}, {0x4e07}, {0x0, 0x0, 0x0, [], 0x7fff}, {0x6, 0x0, 0x0, [], 0x20}, {0xdcb}, {}, {0x0, 0x8}, {0x4, 0x0, 0xfffffffffffffffe}, {0x9, 0x2, 0x6}, {}, {0xa, 0x0, 0x5, [], 0x100000001}, {}, {0x0, 0x0, 0x0, [], 0x3}]}}) eventfd(0x0) epoll_create(0x5) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) 07:34:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x355, 0x80000) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfeffffff00000000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:34:42 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req={0xff, 0x3, 0x401, 0x3ff}, 0x10) geteuid() ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) [ 488.743390][ T3084] FAULT_INJECTION: forcing a failure. [ 488.743390][ T3084] name failslab, interval 1, probability 0, space 0, times 0 [ 488.808132][ T3084] CPU: 1 PID: 3084 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 488.817225][ T3084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.817231][ T3084] Call Trace: [ 488.817261][ T3084] dump_stack+0x172/0x1f0 [ 488.817282][ T3084] should_fail.cold+0xa/0x15 [ 488.817299][ T3084] ? fault_create_debugfs_attr+0x180/0x180 [ 488.817319][ T3084] ? page_to_nid.part.0+0x20/0x20 [ 488.817339][ T3084] ? ___might_sleep+0x163/0x280 [ 488.830746][ T3084] __should_failslab+0x121/0x190 [ 488.830764][ T3084] should_failslab+0x9/0x14 [ 488.830777][ T3084] __kmalloc_track_caller+0x2dc/0x760 [ 488.830792][ T3084] ? mntput+0x74/0xa0 [ 488.830806][ T3084] ? strndup_user+0x77/0xd0 [ 488.830826][ T3084] memdup_user+0x26/0xb0 [ 488.837245][ T3077] IPVS: ftp: loaded support on port[0] = 21 [ 488.839732][ T3084] strndup_user+0x77/0xd0 [ 488.839750][ T3084] ksys_mount+0x3c/0x150 [ 488.839765][ T3084] __x64_sys_mount+0xbe/0x150 [ 488.839786][ T3084] do_syscall_64+0xfa/0x760 [ 488.839803][ T3084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.839814][ T3084] RIP: 0033:0x45c27a [ 488.839830][ T3084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 488.839844][ T3084] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.850658][ T3084] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:34:42 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) flock(r0, 0x4) flistxattr(r0, &(0x7f0000000000)=""/79, 0x4f) socketpair(0x1b, 0x7, 0xb4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x8, 0xc0000000}, 0x28}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r3, 0xa10, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7bc}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 07:34:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz0\x00') mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xffffffffa0008000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 488.850665][ T3084] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 488.850672][ T3084] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 488.850679][ T3084] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 488.850685][ T3084] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:42 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffff000, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 489.243178][ T3246] FAULT_INJECTION: forcing a failure. [ 489.243178][ T3246] name failslab, interval 1, probability 0, space 0, times 0 [ 489.279178][ T3246] CPU: 1 PID: 3246 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 489.288250][ T3246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.298570][ T3246] Call Trace: [ 489.301881][ T3246] dump_stack+0x172/0x1f0 [ 489.306232][ T3246] should_fail.cold+0xa/0x15 [ 489.310840][ T3246] ? fault_create_debugfs_attr+0x180/0x180 [ 489.316658][ T3246] ? page_to_nid.part.0+0x20/0x20 [ 489.316678][ T3246] ? ___might_sleep+0x163/0x280 [ 489.326540][ T3246] __should_failslab+0x121/0x190 [ 489.331477][ T3246] should_failslab+0x9/0x14 [ 489.335975][ T3246] __kmalloc_track_caller+0x2dc/0x760 [ 489.341352][ T3246] ? mntput+0x74/0xa0 [ 489.345434][ T3246] ? strndup_user+0x77/0xd0 [ 489.349934][ T3246] memdup_user+0x26/0xb0 [ 489.354172][ T3246] strndup_user+0x77/0xd0 [ 489.358500][ T3246] ksys_mount+0x3c/0x150 [ 489.362745][ T3246] __x64_sys_mount+0xbe/0x150 [ 489.362771][ T3246] do_syscall_64+0xfa/0x760 [ 489.372035][ T3246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.372045][ T3246] RIP: 0033:0x45c27a [ 489.372060][ T3246] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 489.372067][ T3246] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.372079][ T3246] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 489.372085][ T3246] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 489.372091][ T3246] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 489.372098][ T3246] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 489.372105][ T3246] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 489.498223][ T3097] IPVS: ftp: loaded support on port[0] = 21 07:34:42 executing program 1: 07:34:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) mlock(&(0x7f0000011000/0x1000)=nil, 0x1000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='TIPC\x00', &(0x7f00000001c0)='./file0\x00', r2) r3 = request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='wlan1cgroupbdevposix_acl_access\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000480)='id_resolver\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)="60c99abe9bd826b1fcec843ab3b961d7806f38c491ee8fce8f1e70c78528898f5d2b71aafd64e07705262ff63b9f949c1d209c876044980dd1f776446ed107d3ba677f80d28c8e7e460d31adf3423bba219352d25b89cc3d97111e2bedf5967f15ff0896cfc19ecb146d77cc73750f959869c9239e4e654d", 0x78, 0xfffffffffffffff9) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r5, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r6, 0x300, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x2000)=nil, 0x2000}, 0x3}) accept$netrom(r2, &(0x7f0000000380)={{0x3, @netrom}, [@null, @default, @null, @remote, @rose, @rose, @remote, @bcast]}, &(0x7f0000000340)=0x48) 07:34:42 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000200)={0x1d, &(0x7f00000001c0)="11b0e4ad2cad0188d5c054e05e7b9b605a0debeade42602da37e3279fa"}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x28000, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000040)={0x7a, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e21, @local}}}, 0x108) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) 07:34:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bce054a", 0x0}, 0x28) 07:34:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x350}, 0x20) 07:34:42 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x2}, 0x28) [ 489.643649][ T3259] FAULT_INJECTION: forcing a failure. [ 489.643649][ T3259] name failslab, interval 1, probability 0, space 0, times 0 [ 489.688697][ T3259] CPU: 0 PID: 3259 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 489.697796][ T3259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.707960][ T3259] Call Trace: [ 489.711292][ T3259] dump_stack+0x172/0x1f0 [ 489.715732][ T3259] should_fail.cold+0xa/0x15 [ 489.715755][ T3259] ? fault_create_debugfs_attr+0x180/0x180 [ 489.726150][ T3259] ? page_to_nid.part.0+0x20/0x20 [ 489.731201][ T3259] ? ___might_sleep+0x163/0x280 [ 489.737543][ T3259] __should_failslab+0x121/0x190 [ 489.737570][ T3259] should_failslab+0x9/0x14 [ 489.747002][ T3259] kmem_cache_alloc_trace+0x2d3/0x790 [ 489.752388][ T3259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.752407][ T3259] ? _copy_from_user+0x12c/0x1a0 [ 489.763571][ T3259] copy_mount_options+0x5c/0x3f0 [ 489.763585][ T3259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.763600][ T3259] ksys_mount+0xa7/0x150 [ 489.763613][ T3259] __x64_sys_mount+0xbe/0x150 [ 489.763636][ T3259] do_syscall_64+0xfa/0x760 [ 489.788179][ T3259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.794075][ T3259] RIP: 0033:0x45c27a [ 489.797977][ T3259] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 489.817575][ T3259] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.825996][ T3259] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:34:43 executing program 3: 07:34:43 executing program 1: 07:34:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xfc, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001600)={0x0, @in6={{0xa, 0x4e23, 0x4, @rand_addr="b17016a9f109c3e1d9990909997ec9c8", 0x9}}, [0x8, 0xffffffffffffffc0, 0x2, 0x8, 0x7, 0x5, 0xfffffffffffffffd, 0x23, 0xfffffffffffffffa, 0x10001, 0x2, 0x2323, 0x1, 0x3]}, &(0x7f0000001700)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001740)={r3, 0x9}, &(0x7f0000001780)=0x8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)=0x0) ioprio_get$pid(0x1, r4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:43 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="b096531195f56323037dcac37efab0964b9439f677535af63a611f0403667b835a43", 0x22}, {&(0x7f00000000c0)="c5bac165cc", 0x5}], 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000040)={0x20, {0x5, 0x1000, 0x7, 0x9b1, 0x4, 0x5}}) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) [ 489.833968][ T3259] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 489.841936][ T3259] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 489.849905][ T3259] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 489.857870][ T3259] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x8000, 0x0) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x6, {0x9, 0x1f, 0xba, 0x7fffffff, 0x5, 0x6}, 0x6, 0x8001}, 0xe) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="de4d23e3d75585c903a0e44578d47a149c73a228509957109995d78664c0ba8d1b10eb18d72825979e795efbd107369104949a445b5f1133ce4081ba7d1c94d1565fd8952f2e719192d5c1d772c26910abb8f0858cba33d0d32695b0ed3b25591a327e460215d19dacac0d8d98e77d7d15512ec5c4af14dd69de9c726679e02abdc0b04f22b7e621ca4ee9ca4646eed75f7b30c8c8a8220757a7359a76518f256a4a7dee881a5e428dcde71c51e9a2", 0xaf, 0x0, &(0x7f0000000340)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) setresuid(0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) 07:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xf0}, 0x28) 07:34:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xf, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:34:43 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:43 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffffffffff33, 0x4000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x100000000, 0x9, 0x4, 0x9, 0x200}, &(0x7f0000000100)=0x14) 07:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x3f00}, 0x28) 07:34:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000100)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = dup(r0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000080)) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000000)={0x0, 0x102, 0x0, {0x2b7, 0x7, 0x6, 0x3}}) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000040)={0x5, 0x4, 0x7fffffff, 0x1000}) [ 490.156104][ T3292] FAULT_INJECTION: forcing a failure. [ 490.156104][ T3292] name failslab, interval 1, probability 0, space 0, times 0 [ 490.222894][ T3292] CPU: 1 PID: 3292 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 490.231986][ T3292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.242057][ T3292] Call Trace: [ 490.245368][ T3292] dump_stack+0x172/0x1f0 [ 490.249715][ T3292] should_fail.cold+0xa/0x15 [ 490.254415][ T3292] ? fault_create_debugfs_attr+0x180/0x180 [ 490.260259][ T3292] ? page_to_nid.part.0+0x20/0x20 [ 490.265307][ T3292] ? ___might_sleep+0x163/0x280 [ 490.270181][ T3292] __should_failslab+0x121/0x190 [ 490.275139][ T3292] should_failslab+0x9/0x14 [ 490.279651][ T3292] kmem_cache_alloc+0x2aa/0x710 [ 490.284509][ T3292] ? __schedule+0x75d/0x15b0 [ 490.289124][ T3292] getname_flags+0xd6/0x5b0 [ 490.293636][ T3292] user_path_at_empty+0x2f/0x50 [ 490.298494][ T3292] do_mount+0x150/0x1c30 [ 490.302752][ T3292] ? retint_kernel+0x2b/0x2b [ 490.307352][ T3292] ? copy_mount_string+0x40/0x40 [ 490.312300][ T3292] ? copy_mount_options+0x252/0x3f0 [ 490.317533][ T3292] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 490.323116][ T3292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.329384][ T3292] ? copy_mount_options+0x2e8/0x3f0 [ 490.334609][ T3292] ksys_mount+0xdb/0x150 [ 490.338932][ T3292] __x64_sys_mount+0xbe/0x150 [ 490.343624][ T3292] do_syscall_64+0xfa/0x760 [ 490.348134][ T3292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.354021][ T3292] RIP: 0033:0x45c27a [ 490.357905][ T3292] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 490.377496][ T3292] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.385900][ T3292] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 490.393862][ T3292] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 490.401823][ T3292] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 490.409783][ T3292] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 490.417749][ T3292] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:43 executing program 2: clock_gettime(0x3, &(0x7f0000001140)) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000040)=""/4096) stat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x8) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r2}) open(&(0x7f0000001100)='./file0\x00', 0x111000, 0x41) 07:34:43 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x10000007d) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYPTR], 0x8) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 07:34:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x545, 0xb, "38433b63b73ddf417a2b55"}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x1000000000000000}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x4000}, 0x28) 07:34:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xf, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:34:43 executing program 2: lsetxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64EXEC\x00', &(0x7f0000000280)='usersecurity%posix_acl_accesswlan1\\!\x00', 0x25, 0x3) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in=@remote, @in6=@initdev}}, {{@in=@multicast2}}}, &(0x7f0000000100)=0xe8) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r1}) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x40000, 0x88) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x1) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r1, r3) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x5) 07:34:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xf, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:34:44 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xf000}, 0x28) 07:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) 07:34:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xf, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:34:44 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2080080, &(0x7f0000000200)={'trans=unix,', {[{@noextend='noextend'}], [{@fsname={'fsname', 0x3d, '*-^'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@audit='audit'}, {@euid_lt={'euid<', r0}}]}}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000002c0)={0x80000000000000, 0x5004, 0x401, 0x4, 0xd}) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:44 executing program 1: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/33, 0x57}], 0x1) 07:34:44 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e24, @broadcast}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x4, 0x20}, 0xc) 07:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x8000a0}, 0x28) [ 491.122294][ T3560] FAULT_INJECTION: forcing a failure. [ 491.122294][ T3560] name failslab, interval 1, probability 0, space 0, times 0 [ 491.160506][ T3560] CPU: 0 PID: 3560 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 491.169686][ T3560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.180184][ T3560] Call Trace: [ 491.186420][ T3560] dump_stack+0x172/0x1f0 [ 491.190856][ T3560] should_fail.cold+0xa/0x15 [ 491.195463][ T3560] ? do_syscall_64+0xfa/0x760 [ 491.200169][ T3560] ? fault_create_debugfs_attr+0x180/0x180 [ 491.206092][ T3560] ? page_to_nid.part.0+0x20/0x20 [ 491.211605][ T3560] ? ___might_sleep+0x163/0x280 [ 491.216552][ T3560] __should_failslab+0x121/0x190 [ 491.221750][ T3560] should_failslab+0x9/0x14 [ 491.226259][ T3560] kmem_cache_alloc+0x2aa/0x710 [ 491.231119][ T3560] ? __kasan_check_write+0x14/0x20 [ 491.236249][ T3560] getname_flags+0xd6/0x5b0 [ 491.240780][ T3560] user_path_at_empty+0x2f/0x50 [ 491.245654][ T3560] do_mount+0x150/0x1c30 [ 491.249913][ T3560] ? kasan_kmalloc+0x9/0x10 [ 491.254440][ T3560] ? copy_mount_string+0x40/0x40 [ 491.259388][ T3560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.265635][ T3560] ? copy_mount_options+0x2e8/0x3f0 [ 491.270839][ T3560] ksys_mount+0xdb/0x150 [ 491.275085][ T3560] __x64_sys_mount+0xbe/0x150 [ 491.279786][ T3560] do_syscall_64+0xfa/0x760 [ 491.284287][ T3560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.290252][ T3560] RIP: 0033:0x45c27a [ 491.294133][ T3560] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 491.313806][ T3560] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x7ff, 0x0, 0x200}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x5bf92505}, &(0x7f0000000100)=0x8) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:44 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001680)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x28000) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000040)={0x4a36, "0c96b865ec1a718a6d229ccad8714a16b0f49af9412eaa03baf2665776532e2a", 0xfc515ffbffa6e83, 0x0, 0x5, 0xb800, 0x6}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r2, 0x8, 0x575}, &(0x7f0000000540)=0xc) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f0000000440)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r3 = gettid() get_robust_list(r3, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000100)}, 0x0, &(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x503}, &(0x7f00000002c0)=0x4b) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xfba) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f00000000c0)=0x401) getsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000580)=""/124, &(0x7f0000000600)=0x7c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e24, 0xffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffff}}, 0x8, 0x8, 0x8, 0x10001, 0x1000}, &(0x7f0000000200)=0x98) [ 491.322202][ T3560] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 491.330246][ T3560] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 491.338199][ T3560] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 491.346660][ T3560] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 491.354641][ T3560] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:44 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffd17, 0x0}, 0x3) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f00000004c0)='./file1\x00', 0xff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000340)=""/168, 0xa8) fcntl$setown(0xffffffffffffffff, 0x8, r1) r3 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, &(0x7f0000000140)=0x80, 0x80800) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) r5 = getuid() r6 = getuid() lstat(&(0x7f0000000d00)='./file1\x00', &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900), &(0x7f0000000940)=0x0, &(0x7f0000000980)) fstat(r0, &(0x7f0000000a00)) r9 = getgid() getresgid(&(0x7f0000000a80), &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)) getgroups(0x1, &(0x7f0000000b40)=[0xffffffffffffffff]) r12 = getgid() semctl$IPC_RMID(0x0, 0x0, 0x0) r13 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2, r4}, {0x2, 0x7, r5}, {0x2, 0x3}, {0x2, 0x2, r6}], {0x4, 0x7}, [{0x8, 0x0, r7}, {0x8, 0x5, r8}, {0x8, 0x2, r9}, {0x8, 0x7, r10}, {0x8, 0x1, r11}, {0x8, 0x0, r12}, {0x8, 0x0, r13}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x84, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 07:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7d8, 0x100) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000080), 0x4) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) 07:34:44 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:44 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r2}) 07:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xf0ffff}, 0x28) 07:34:44 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0x4008af00, 0x0) 07:34:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x3}) 07:34:45 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000001440)='/dev/usbmon#\x00', 0x515, 0x501040) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000001480)={0x3, 0x2, 0xfffffffffffff03a, 0x4, 'syz1\x00', 0x3ff}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) vmsplice(r0, &(0x7f00000013c0)=[{&(0x7f0000001080)="5856ff3a445c8ac8b3af7d91285fc6c8918b78cdb08ca703ab421b21a7196298a851dbc8f67d35a94b76f2d5d112133c8405428aa2632eaaaf0513560b6ee2b67f62b3480ac2bc711cf06dfd1f0532", 0x4f}, {&(0x7f0000001100)="887aa6d5d2bca262f5f75fe870b90048aaa48a6338ba777a4d32260b5e37e9767586c7787f77a12a8f32d6703b6e2b9f17846da814e6cfc4e1eca8303c92534e35eccf7dd23f6c6c93f76b7f6d269656f4e0e7a480dc287ed4d2355db3e92dd330ec5d0823f7", 0x66}, {&(0x7f0000001180)="332bc0abc45fd9642ac4f5d72ee76d3ab5c0779bf3710d46005002a381c4388d9c5cf109883fc664551dd6c51a8a4345acd68f0ef772db323239f9f6dbc14d71025724badeb133f760b142c44d730744f5313dae4ea0319220515d472db195193ef21019cc072f0eee8138fbaf17230beeee6b2b37bd3d2a85ad60cc555b4a15a4ba2967c1cbd02bb25d6ce5e89a515bc154a062774a8836f9572c707b04a187bb8f29b3877f59f6ae29", 0xaa}, {&(0x7f0000001240)="5f000d546a4cc54396ea3e19617f52738f9973d4aa2a553c1aa9c4352df92a4e052b85f2712e5325dd626ef614f916423aa4cb6feab8e762b6bac07cb77680f5d5ed057db83c63af506e4e8f7282907d7a296e2e0bf80942c8c17a8f3f6499de79f5075de55cac8bd87269b8c7444a192a2dfb57837ed0ac9902cd76d697861b081faaed28c0b84a3009bec5167d5f7ba3a7ca983ecccf709909c8d4cd7dd4c8c579e29f69d2ab8ca691ebe0a16c", 0xae}, {&(0x7f0000001300)="67b4f93d1afbcee36b64036d21ac4c8af9e4b2926fe9599f80e11d3c0afb2c1d7cdc7165bf8cbd2c129a528541ce07da967c062ec3ecc5bc25ff35bd89971de034c6883ff2efbbce49c27a55e2f5242b8133af1a55f24413f726a63bd1beb2f07a22b56ecde46d9572b2359796299ee9816e44e6bd66d9415d3467985ca3da541881906153e4d28891aa79b8d06b3333a7a2ea741c8a29c83e34675189332357cae4646528f563f8", 0xa8}], 0x5, 0xf) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) write$UHID_INPUT(r2, &(0x7f0000000040)={0x8, "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", 0x1000}, 0x1006) [ 491.781998][ T3594] FAULT_INJECTION: forcing a failure. [ 491.781998][ T3594] name failslab, interval 1, probability 0, space 0, times 0 07:34:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = dup3(r1, r0, 0x80000) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000100)=[{{0x77359400}, 0x12, 0x4, 0x10001}, {{}, 0x17, 0x4, 0x9}, {{}, 0x17, 0x2, 0x2}, {{0x77359400}, 0x16, 0x400, 0xe57c}, {{r3, r4/1000+10000}, 0x1f, 0x3ce8, 0x6}, {{0x0, 0x2710}, 0x0, 0x3, 0x6}, {{r5, r6/1000+30000}, 0x13, 0x3}, {{r7, r8/1000+30000}, 0x1f, 0x3, 0x200}, {{r9, r10/1000+30000}, 0x7, 0x3, 0x6}], 0xd8) 07:34:45 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4000000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) [ 491.865521][ T3594] CPU: 0 PID: 3594 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 491.874604][ T3594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.884687][ T3594] Call Trace: [ 491.888019][ T3594] dump_stack+0x172/0x1f0 [ 491.892380][ T3594] should_fail.cold+0xa/0x15 [ 491.896998][ T3594] ? do_syscall_64+0xfa/0x760 [ 491.901701][ T3594] ? fault_create_debugfs_attr+0x180/0x180 [ 491.908422][ T3594] ? page_to_nid.part.0+0x20/0x20 [ 491.913484][ T3594] ? ___might_sleep+0x163/0x280 [ 491.918363][ T3594] __should_failslab+0x121/0x190 [ 491.923321][ T3594] should_failslab+0x9/0x14 [ 491.927838][ T3594] kmem_cache_alloc+0x2aa/0x710 [ 491.932707][ T3594] ? __kasan_check_write+0x14/0x20 [ 491.937839][ T3594] getname_flags+0xd6/0x5b0 [ 491.942362][ T3594] user_path_at_empty+0x2f/0x50 [ 491.947194][ T3580] overlayfs: conflicting lowerdir path [ 491.947403][ T3594] do_mount+0x150/0x1c30 [ 491.947419][ T3594] ? kasan_kmalloc+0x9/0x10 07:34:45 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) open_by_handle_at(r0, &(0x7f0000000000)={0x7d, 0x0, "9da170ad0e6014970a660abcafd5789a9180e31d7570d90e6ddc2a6bb40511a37185179640a39cf7292004d5fff40225866f6229b20174b6ff985e44d34b7b1d8f554c99d42be9a19df8b485b07781d60b24242af8c5ed4090ed606a14d79d0fa7ba45bf25bf3422f97422e5a7de3780d6d6fc6911"}, 0x58000) r1 = syz_init_net_socket$ax25(0x3, 0xea4fea92acbc4e5e, 0xcf) accept4$ax25(r1, 0x0, &(0x7f0000000080), 0x0) r2 = dup(r0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f00000000c0)=0x4) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x3, @remote, 'veth1_to_hsr\x00'}}) [ 491.947436][ T3594] ? copy_mount_string+0x40/0x40 [ 491.966568][ T3594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.972833][ T3594] ? copy_mount_options+0x2e8/0x3f0 [ 491.978071][ T3594] ksys_mount+0xdb/0x150 [ 491.982339][ T3594] __x64_sys_mount+0xbe/0x150 [ 491.987046][ T3594] do_syscall_64+0xfa/0x760 [ 491.991556][ T3594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.997443][ T3594] RIP: 0033:0x45c27a [ 492.001335][ T3594] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 492.020953][ T3594] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 492.029383][ T3594] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 492.037367][ T3594] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 492.045817][ T3594] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 492.053800][ T3594] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 492.061864][ T3594] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x401) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x661}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 07:34:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x4}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x800, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000000)={0xc, {0x76, 0x3, 0x6, 0x6ac}}) 07:34:45 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) set_thread_area(&(0x7f0000000000)={0x16e, 0x20100800, 0x1400, 0x3, 0x0, 0x7d8, 0x9, 0x9, 0xf3c, 0x200}) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x3ff, 0x5}, {0x7}]}, 0x14, 0x1) 07:34:45 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:45 executing program 1: add_key(&(0x7f0000000340)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 492.398862][ T3727] sctp: failed to load transform for md5: -4 07:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x1000000}, 0x28) 07:34:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x42, 0x0) madvise(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x1) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x8001, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='&\x00', 0x0}, 0x30) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000140)=0xa, &(0x7f0000000180)=0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:45 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@default, @bcast, @bcast, @null, @bcast, @bcast, @default, @default]}, &(0x7f00000001c0)=0x48) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x100000000, 0x2240) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000002c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40000, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f00000000c0)='/dev/cachefiles\x00', 0x10, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000080)=0x6, 0xffffffffffffff95) 07:34:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffbff0000aea5, 0x0) 07:34:45 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0xffff, &(0x7f0000000640)="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") [ 492.510612][ T3839] FAULT_INJECTION: forcing a failure. [ 492.510612][ T3839] name failslab, interval 1, probability 0, space 0, times 0 [ 492.542753][ T3839] CPU: 1 PID: 3839 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 492.552025][ T3839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.562090][ T3839] Call Trace: [ 492.565399][ T3839] dump_stack+0x172/0x1f0 [ 492.569751][ T3839] should_fail.cold+0xa/0x15 [ 492.574371][ T3839] ? fault_create_debugfs_attr+0x180/0x180 [ 492.580248][ T3839] ? ___might_sleep+0x163/0x280 [ 492.585126][ T3839] __should_failslab+0x121/0x190 [ 492.590192][ T3839] should_failslab+0x9/0x14 [ 492.594808][ T3839] __kmalloc+0x2e0/0x770 [ 492.599078][ T3839] ? save_stack+0x5c/0x90 [ 492.603424][ T3839] ? save_stack+0x23/0x90 [ 492.607776][ T3839] ? tomoyo_encode2.part.0+0xf5/0x400 [ 492.613163][ T3839] tomoyo_encode2.part.0+0xf5/0x400 [ 492.618408][ T3839] ? do_syscall_64+0xfa/0x760 [ 492.623107][ T3839] tomoyo_encode+0x2b/0x50 [ 492.627548][ T3839] tomoyo_mount_acl+0xe0/0x840 [ 492.632339][ T3839] ? __kasan_check_read+0x11/0x20 [ 492.637385][ T3839] ? __kasan_check_write+0x14/0x20 [ 492.642511][ T3839] ? lock_downgrade+0x920/0x920 [ 492.647379][ T3839] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 492.652943][ T3839] ? debug_check_no_obj_freed+0xc0/0x43f [ 492.658602][ T3839] ? trace_hardirqs_off+0x62/0x240 [ 492.663736][ T3839] ? lock_acquire+0x190/0x410 [ 492.663757][ T3839] ? tomoyo_mount_permission+0x10a/0x410 [ 492.674066][ T3839] tomoyo_mount_permission+0x16a/0x410 [ 492.679542][ T3839] ? tomoyo_mount_permission+0x10a/0x410 [ 492.679553][ T3839] ? tomoyo_mount_acl+0x840/0x840 [ 492.679569][ T3839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 492.679585][ T3839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 492.679608][ T3839] ? strncpy_from_user+0x2b4/0x400 [ 492.696538][ T3839] tomoyo_sb_mount+0x35/0x40 [ 492.696561][ T3839] security_sb_mount+0x87/0xd0 [ 492.717243][ T3839] do_mount+0x1d4/0x1c30 [ 492.721544][ T3839] ? kasan_kmalloc+0x9/0x10 [ 492.726053][ T3839] ? copy_mount_string+0x40/0x40 [ 492.726076][ T3839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.737253][ T3839] ? copy_mount_options+0x2e8/0x3f0 [ 492.742488][ T3839] ksys_mount+0xdb/0x150 [ 492.746756][ T3839] __x64_sys_mount+0xbe/0x150 [ 492.751464][ T3839] do_syscall_64+0xfa/0x760 [ 492.755990][ T3839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.761886][ T3839] RIP: 0033:0x45c27a [ 492.765796][ T3839] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 492.785414][ T3839] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 492.793851][ T3839] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 492.801845][ T3839] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:34:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x2}) sysfs$3(0x3) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) 07:34:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) [ 492.809841][ T3839] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 492.817830][ T3839] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 492.825818][ T3839] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:46 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000040)=0x3a, 0x6, 0x6) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$KDSETLED(r2, 0x4b32, 0x5) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:46 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x80000000) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400) [ 493.597637][ T3974] FAULT_INJECTION: forcing a failure. [ 493.597637][ T3974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.610914][ T3974] CPU: 1 PID: 3974 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 493.620033][ T3974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.630107][ T3974] Call Trace: [ 493.633457][ T3974] dump_stack+0x172/0x1f0 [ 493.637805][ T3974] should_fail.cold+0xa/0x15 [ 493.642420][ T3974] ? fault_create_debugfs_attr+0x180/0x180 [ 493.648262][ T3974] ? stack_trace_save+0xac/0xe0 [ 493.653222][ T3974] ? stack_trace_consume_entry+0x190/0x190 [ 493.659053][ T3974] should_fail_alloc_page+0x50/0x60 [ 493.664272][ T3974] __alloc_pages_nodemask+0x1a1/0x900 [ 493.669661][ T3974] ? __alloc_pages_slowpath+0x2520/0x2520 [ 493.675403][ T3974] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 493.681056][ T3974] ? __kasan_check_read+0x11/0x20 [ 493.686104][ T3974] ? fault_create_debugfs_attr+0x180/0x180 [ 493.691925][ T3974] cache_grow_begin+0x90/0xd20 [ 493.696803][ T3974] ? getname_flags+0xd6/0x5b0 [ 493.701495][ T3974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 493.707743][ T3974] kmem_cache_alloc+0x64e/0x710 [ 493.712615][ T3974] getname_flags+0xd6/0x5b0 [ 493.717134][ T3974] user_path_at_empty+0x2f/0x50 [ 493.722016][ T3974] do_mount+0x150/0x1c30 [ 493.726283][ T3974] ? kasan_kmalloc+0x9/0x10 [ 493.730812][ T3974] ? copy_mount_string+0x40/0x40 [ 493.736979][ T3974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.743261][ T3974] ? copy_mount_options+0x2e8/0x3f0 [ 493.748476][ T3974] ksys_mount+0xdb/0x150 [ 493.752734][ T3974] __x64_sys_mount+0xbe/0x150 [ 493.757428][ T3974] do_syscall_64+0xfa/0x760 [ 493.761950][ T3974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.767845][ T3974] RIP: 0033:0x45c27a [ 493.771749][ T3974] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:34:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x2000000}, 0x28) 07:34:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) 07:34:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r2, r3, 0x23, &(0x7f0000000080)={0xb, 0x4, 0x80000000}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 07:34:47 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) inotify_init() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x68000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, r2, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4da}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000000}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x4014) [ 493.791365][ T3974] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.799790][ T3974] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 493.807773][ T3974] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 493.815756][ T3974] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 493.823735][ T3974] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 493.831715][ T3974] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000013000/0x2000)=nil, 0x2000, 0x0, 0x40000000001d, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7fff, 0x10800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000140)={r3, 0x0, 0xb4, "926ee14a52151eef201f9a2e14a305cd642c1ba16209647bc0689552c3c5170f76dd979832a0891e9bea9f8c76b21cd25882dda09bb575b8f1c5912fe881c658a0eed3ca3d3b4b06ff2795d092f4a77aa10d0fdf2062f044c89e271870639450967036d7753c397f2109195adb77e8903b8f4503decaa16f57b6c0b5e7e4439bde3bc1445bc74bb2150259d96d2b437be5599397e7c6052deef50878363796727e713cf1d85d84ad69d27c831a8f600ce5e559fa"}, 0xbc) r4 = fcntl$dupfd(r1, 0x406, r0) unlinkat(r2, &(0x7f0000000200)='./file0\x00', 0x200) getsockopt$inet6_dccp_int(r4, 0x21, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) 07:34:47 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x383442, 0x0) restart_syscall() sendmsg$nl_netfilter(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/640], 0x280}, 0x1, 0x0, 0x0, 0x20040005}, 0x8000) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) [ 494.016429][ T3974] ISOFS: Unable to identify CD-ROM format. 07:34:47 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x1, 0x6a5, 0x7fff, 0x1}, 0x10) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) [ 494.169543][ T3993] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 494.187231][ T3993] __nla_validate_parse: 34 callbacks suppressed [ 494.187240][ T3993] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 07:34:47 executing program 1: ioctl(0xffffffffffffffff, 0xfffffbff0000ab0a, 0x0) 07:34:47 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fcntl$setpipe(r0, 0x407, 0x8001) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) [ 494.278605][ T3999] FAULT_INJECTION: forcing a failure. [ 494.278605][ T3999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.291875][ T3999] CPU: 0 PID: 3999 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 494.300909][ T3999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.310977][ T3999] Call Trace: [ 494.314291][ T3999] dump_stack+0x172/0x1f0 [ 494.318647][ T3999] should_fail.cold+0xa/0x15 [ 494.323264][ T3999] ? fault_create_debugfs_attr+0x180/0x180 [ 494.329088][ T3999] ? stack_trace_save+0xac/0xe0 [ 494.333948][ T3999] ? stack_trace_consume_entry+0x190/0x190 [ 494.339752][ T3999] should_fail_alloc_page+0x50/0x60 [ 494.339762][ T3999] __alloc_pages_nodemask+0x1a1/0x900 [ 494.339773][ T3999] ? __alloc_pages_slowpath+0x2520/0x2520 [ 494.339785][ T3999] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 494.339797][ T3999] ? __kasan_check_read+0x11/0x20 [ 494.339823][ T3999] ? fault_create_debugfs_attr+0x180/0x180 [ 494.372721][ T3999] cache_grow_begin+0x90/0xd20 [ 494.377503][ T3999] ? getname_flags+0xd6/0x5b0 [ 494.382197][ T3999] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 494.388453][ T3999] kmem_cache_alloc+0x64e/0x710 [ 494.393339][ T3999] getname_flags+0xd6/0x5b0 [ 494.397952][ T3999] user_path_at_empty+0x2f/0x50 [ 494.402859][ T3999] do_mount+0x150/0x1c30 [ 494.407109][ T3999] ? kasan_kmalloc+0x9/0x10 [ 494.411615][ T3999] ? copy_mount_string+0x40/0x40 [ 494.416566][ T3999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.422818][ T3999] ? copy_mount_options+0x2e8/0x3f0 [ 494.428026][ T3999] ksys_mount+0xdb/0x150 [ 494.432271][ T3999] __x64_sys_mount+0xbe/0x150 [ 494.436957][ T3999] do_syscall_64+0xfa/0x760 [ 494.441477][ T3999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.447372][ T3999] RIP: 0033:0x45c27a [ 494.451263][ T3999] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 494.451269][ T3999] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.451279][ T3999] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 494.451285][ T3999] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 494.451291][ T3999] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 494.451297][ T3999] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 494.451310][ T3999] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 494.564964][ T3999] ISOFS: Unable to identify CD-ROM format. 07:34:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x3f000000}, 0x28) 07:34:48 executing program 1: ioctl(0xffffffffffffffff, 0xfffffbff0000ab0a, 0x0) 07:34:48 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e20, 0x3f, @mcast2, 0x6}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e21, 0x9, @local, 0x1ff}], 0x58) exit(0x4) ioctl$FICLONE(r0, 0x40049409, r0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x7fffffff) 07:34:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='eql\x00') r2 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x10) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000080)=0x1) 07:34:48 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:48 executing program 1: ioctl(0xffffffffffffffff, 0xfffffbff0000ab0a, 0x0) [ 494.872407][ T4013] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 494.904311][ T4013] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 07:34:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x81, 0x200400) userfaultfd(0x80800) fallocate(r1, 0x11, 0x80000001, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x3, @ipv4={[], [], @local}, 0x80000000}}, 0x100, 0x6, 0x0, 0x4, 0x9}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x2, 0x6f3800000000000, 0x1, r2}, 0x10) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r3 = userfaultfd(0x800) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 494.977203][ T4020] FAULT_INJECTION: forcing a failure. [ 494.977203][ T4020] name failslab, interval 1, probability 0, space 0, times 0 [ 495.027222][ T4020] CPU: 1 PID: 4020 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 495.036314][ T4020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.046376][ T4020] Call Trace: [ 495.049674][ T4020] dump_stack+0x172/0x1f0 [ 495.054000][ T4020] should_fail.cold+0xa/0x15 [ 495.058597][ T4020] ? debug_check_no_obj_freed+0xc0/0x43f [ 495.064219][ T4020] ? fault_create_debugfs_attr+0x180/0x180 [ 495.070019][ T4020] ? page_to_nid.part.0+0x20/0x20 [ 495.075041][ T4020] ? ___might_sleep+0x163/0x280 [ 495.079876][ T4020] __should_failslab+0x121/0x190 [ 495.084799][ T4020] should_failslab+0x9/0x14 [ 495.089287][ T4020] kmem_cache_alloc+0x2aa/0x710 [ 495.094212][ T4020] ? __kasan_check_write+0x14/0x20 [ 495.099311][ T4020] getname_kernel+0x53/0x370 [ 495.103905][ T4020] kern_path+0x20/0x40 [ 495.107958][ T4020] tomoyo_mount_acl+0x28c/0x840 [ 495.112791][ T4020] ? __kasan_check_read+0x11/0x20 [ 495.117803][ T4020] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 495.123334][ T4020] ? debug_check_no_obj_freed+0xc0/0x43f [ 495.128967][ T4020] ? trace_hardirqs_off+0x62/0x240 [ 495.134070][ T4020] ? lock_acquire+0x190/0x410 [ 495.138731][ T4020] ? tomoyo_mount_permission+0x10a/0x410 [ 495.144350][ T4020] tomoyo_mount_permission+0x16a/0x410 [ 495.149791][ T4020] ? tomoyo_mount_permission+0x10a/0x410 [ 495.155407][ T4020] ? tomoyo_mount_acl+0x840/0x840 [ 495.160421][ T4020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 495.166651][ T4020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 495.172876][ T4020] ? strncpy_from_user+0x2b4/0x400 [ 495.177975][ T4020] tomoyo_sb_mount+0x35/0x40 [ 495.182554][ T4020] security_sb_mount+0x87/0xd0 [ 495.187316][ T4020] do_mount+0x1d4/0x1c30 [ 495.191543][ T4020] ? kasan_kmalloc+0x9/0x10 [ 495.196029][ T4020] ? copy_mount_string+0x40/0x40 [ 495.200959][ T4020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.207189][ T4020] ? copy_mount_options+0x2e8/0x3f0 [ 495.212395][ T4020] ksys_mount+0xdb/0x150 [ 495.216622][ T4020] __x64_sys_mount+0xbe/0x150 [ 495.221289][ T4020] do_syscall_64+0xfa/0x760 [ 495.225801][ T4020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.231675][ T4020] RIP: 0033:0x45c27a [ 495.235553][ T4020] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 495.255224][ T4020] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 495.263791][ T4020] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:34:48 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) 07:34:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 495.271756][ T4020] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 495.279711][ T4020] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 495.288796][ T4020] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 495.296778][ T4020] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:48 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 495.393002][ T4032] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 495.434653][ T4032] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 495.610273][ T4039] FAULT_INJECTION: forcing a failure. [ 495.610273][ T4039] name failslab, interval 1, probability 0, space 0, times 0 [ 495.637029][ T4039] CPU: 0 PID: 4039 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 495.646255][ T4039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.656315][ T4039] Call Trace: [ 495.659640][ T4039] dump_stack+0x172/0x1f0 [ 495.663987][ T4039] should_fail.cold+0xa/0x15 [ 495.668588][ T4039] ? debug_check_no_obj_freed+0xc0/0x43f [ 495.674228][ T4039] ? fault_create_debugfs_attr+0x180/0x180 [ 495.680131][ T4039] ? page_to_nid.part.0+0x20/0x20 [ 495.685180][ T4039] ? ___might_sleep+0x163/0x280 [ 495.690056][ T4039] __should_failslab+0x121/0x190 [ 495.695028][ T4039] should_failslab+0x9/0x14 [ 495.699547][ T4039] kmem_cache_alloc+0x2aa/0x710 [ 495.704411][ T4039] ? __kasan_check_write+0x14/0x20 [ 495.709524][ T4039] getname_kernel+0x53/0x370 [ 495.714119][ T4039] kern_path+0x20/0x40 [ 495.718194][ T4039] tomoyo_mount_acl+0x28c/0x840 [ 495.723046][ T4039] ? __kasan_check_read+0x11/0x20 [ 495.728074][ T4039] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 495.733628][ T4039] ? debug_check_no_obj_freed+0xc0/0x43f [ 495.740776][ T4039] ? trace_hardirqs_off+0x62/0x240 [ 495.745934][ T4039] ? lock_acquire+0x190/0x410 [ 495.750631][ T4039] ? tomoyo_mount_permission+0x10a/0x410 [ 495.756273][ T4039] tomoyo_mount_permission+0x16a/0x410 [ 495.761733][ T4039] ? tomoyo_mount_permission+0x10a/0x410 [ 495.767375][ T4039] ? tomoyo_mount_acl+0x840/0x840 [ 495.772414][ T4039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 495.778673][ T4039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 495.784927][ T4039] ? strncpy_from_user+0x2b4/0x400 [ 495.790046][ T4039] tomoyo_sb_mount+0x35/0x40 [ 495.794644][ T4039] security_sb_mount+0x87/0xd0 [ 495.799416][ T4039] do_mount+0x1d4/0x1c30 [ 495.803659][ T4039] ? kasan_kmalloc+0x9/0x10 [ 495.808172][ T4039] ? copy_mount_string+0x40/0x40 [ 495.813113][ T4039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.819350][ T4039] ? copy_mount_options+0x2e8/0x3f0 [ 495.824568][ T4039] ksys_mount+0xdb/0x150 [ 495.828814][ T4039] __x64_sys_mount+0xbe/0x150 [ 495.833498][ T4039] do_syscall_64+0xfa/0x760 [ 495.838009][ T4039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.843940][ T4039] RIP: 0033:0x45c27a [ 495.847836][ T4039] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 495.867612][ T4039] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 495.876038][ T4039] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 495.884123][ T4039] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 495.892093][ T4039] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 495.900059][ T4039] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:34:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x40000000}, 0x28) 07:34:49 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) 07:34:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r2, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 07:34:49 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x280) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0xf, @raw_data="3fb4b7fe69e07934f11739dd916ee241fa618c9c4d6344c419c861f830c10ef4eed6f27770482b3533358e3eaf28aea9a5bfd19e3b89ccc92e670671b6e131aec6d320f01b05f8d1652495bd05faa46e25e08448fff58bc8ba439519c17660b9af34e0bcc00748c07c5066566015900cae090fc0768dcaa1b4f802c08c3fa7bd72e808110c6e689ed3291db94095e533d6ddfabd01c22de6e0439bb3928fafd6fb8e80652f1393f812df0bcec07946bd16f91a16416ccc2ca4312fe23644a8411fe2a036fa6e4af4"}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8004}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x221, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x1) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x2710, @host}, 0x10) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000400)={0xa, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) openat$cgroup_int(r0, &(0x7f00000002c0)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) ioctl$SIOCAX25GETUID(r2, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) [ 495.909031][ T4039] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:49 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 495.967799][ T4045] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 496.001786][ T4045] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 07:34:49 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xfffffbff0000ab0a, 0x0) 07:34:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x3000000280800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x4f}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:49 executing program 2: setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', '\x00'}, &(0x7f0000000380)='vboxnet0nodev\\\x00', 0xf, 0x2) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@local, @in=@loopback}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) fstat(r0, &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) ioctl$SIOCAX25GETUID(r1, 0x89ea, &(0x7f00000002c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) 07:34:49 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 496.083485][ T4058] FAULT_INJECTION: forcing a failure. [ 496.083485][ T4058] name failslab, interval 1, probability 0, space 0, times 0 07:34:49 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffbff0000ab0a, 0x0) [ 496.162748][ T4058] CPU: 1 PID: 4058 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 496.171835][ T4058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.181902][ T4058] Call Trace: [ 496.185219][ T4058] dump_stack+0x172/0x1f0 [ 496.189564][ T4058] should_fail.cold+0xa/0x15 [ 496.194343][ T4058] ? fault_create_debugfs_attr+0x180/0x180 [ 496.200161][ T4058] ? page_to_nid.part.0+0x20/0x20 [ 496.205195][ T4058] ? ___might_sleep+0x163/0x280 [ 496.210058][ T4058] __should_failslab+0x121/0x190 [ 496.215010][ T4058] should_failslab+0x9/0x14 [ 496.219527][ T4058] kmem_cache_alloc_trace+0x2d3/0x790 [ 496.224899][ T4058] ? __get_fs_type+0x23/0xd0 [ 496.229499][ T4058] alloc_fs_context+0x5a/0x6d0 [ 496.234272][ T4058] fs_context_for_mount+0x25/0x30 [ 496.239308][ T4058] do_mount+0x132d/0x1c30 [ 496.243656][ T4058] ? copy_mount_string+0x40/0x40 [ 496.248611][ T4058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.254859][ T4058] ? copy_mount_options+0x2e8/0x3f0 [ 496.260072][ T4058] ksys_mount+0xdb/0x150 [ 496.264422][ T4058] __x64_sys_mount+0xbe/0x150 [ 496.269123][ T4058] do_syscall_64+0xfa/0x760 [ 496.273657][ T4058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.279548][ T4058] RIP: 0033:0x45c27a [ 496.283461][ T4058] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 496.303097][ T4058] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:34:49 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 496.311513][ T4058] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 496.319489][ T4058] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 496.327463][ T4058] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 496.335437][ T4058] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 496.343416][ T4058] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xa0008000}, 0x28) 07:34:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x7fe) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:50 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:50 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80000000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xac, r2, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x26}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc72}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000001}, 0x44011) 07:34:50 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffbff0000ab0a, 0x0) 07:34:50 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:50 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 496.931561][ T4083] FAULT_INJECTION: forcing a failure. [ 496.931561][ T4083] name failslab, interval 1, probability 0, space 0, times 0 [ 496.977873][ T4083] CPU: 1 PID: 4083 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 496.986973][ T4083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.997140][ T4083] Call Trace: [ 496.997174][ T4083] dump_stack+0x172/0x1f0 [ 497.004797][ T4083] should_fail.cold+0xa/0x15 [ 497.009417][ T4083] ? debug_check_no_obj_freed+0xc0/0x43f [ 497.015074][ T4083] ? fault_create_debugfs_attr+0x180/0x180 [ 497.015098][ T4083] ? page_to_nid.part.0+0x20/0x20 [ 497.026008][ T4083] ? ___might_sleep+0x163/0x280 [ 497.030975][ T4083] __should_failslab+0x121/0x190 [ 497.035930][ T4083] should_failslab+0x9/0x14 [ 497.040454][ T4083] kmem_cache_alloc+0x2aa/0x710 [ 497.045415][ T4083] ? __kasan_check_write+0x14/0x20 [ 497.050572][ T4083] getname_kernel+0x53/0x370 [ 497.050585][ T4083] kern_path+0x20/0x40 [ 497.050598][ T4083] tomoyo_mount_acl+0x28c/0x840 [ 497.050613][ T4083] ? __kasan_check_read+0x11/0x20 [ 497.050631][ T4083] ? tomoyo_check_mount_acl+0x1b0/0x1b0 07:34:50 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffbff0000ab0a, 0x0) 07:34:50 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = getuid() r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r1, r2) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:50 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) [ 497.064115][ T4083] ? debug_check_no_obj_freed+0xc0/0x43f [ 497.064138][ T4083] ? trace_hardirqs_off+0x62/0x240 [ 497.080454][ T4083] ? lock_acquire+0x190/0x410 [ 497.080468][ T4083] ? tomoyo_mount_permission+0x10a/0x410 [ 497.080483][ T4083] tomoyo_mount_permission+0x16a/0x410 [ 497.080501][ T4083] ? tomoyo_mount_permission+0x10a/0x410 [ 497.102065][ T4083] ? tomoyo_mount_acl+0x840/0x840 [ 497.102086][ T4083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 497.118967][ T4083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 07:34:50 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @null}) [ 497.125232][ T4083] ? strncpy_from_user+0x2b4/0x400 [ 497.130368][ T4083] tomoyo_sb_mount+0x35/0x40 [ 497.134979][ T4083] security_sb_mount+0x87/0xd0 [ 497.139775][ T4083] do_mount+0x1d4/0x1c30 [ 497.144028][ T4083] ? kasan_kmalloc+0x9/0x10 [ 497.148543][ T4083] ? copy_mount_string+0x40/0x40 [ 497.153494][ T4083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.153516][ T4083] ? copy_mount_options+0x2e8/0x3f0 [ 497.164948][ T4083] ksys_mount+0xdb/0x150 [ 497.169208][ T4083] __x64_sys_mount+0xbe/0x150 [ 497.173903][ T4083] do_syscall_64+0xfa/0x760 [ 497.178443][ T4083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.184356][ T4083] RIP: 0033:0x45c27a [ 497.188250][ T4083] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 497.208037][ T4083] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 497.208050][ T4083] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:34:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x44010, r0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) getsockname$netlink(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x73, "d505bc6df221c739aa6a62a510070ee82b0c738d4f3bf1bd4834c76cfba15ec48e83f098d944b487c489c5141fb23f17106da9ab51edfd08c2e7f813e3dcfa75ead95fe9cd451d9304e4008dd9a3978000289f9dac128c9ee6e1fd1ba57ae6e7ab4ba542a56fe9912feebbd65eddc65e25a5df"}, &(0x7f0000000280)=0x7b) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000300)={r2, 0x0, 0xcb, 0x8, 0x8, 0x7fff}, 0x14) openat$usbmon(0xffffffffffffff9c, &(0x7f0000000040)='/dev/usbmon0\x00', 0x111200, 0x0) r3 = userfaultfd(0x80800) memfd_create(&(0x7f0000000000)='\xfb-\x00', 0x7) getpid() ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000002c0)) r4 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x81) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000100)={0x10000, 0x5001, 0x8, 0xfffffffffffffff9, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f00000000c0)={0x7, 0x1, 0x8001, 0x7, 0x136d400000000000, 0x80}) [ 497.208058][ T4083] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 497.208066][ T4083] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 497.208072][ T4083] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 497.208078][ T4083] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xfeffffff}, 0x28) 07:34:51 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) 07:34:51 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:51 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x8002, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r1}) 07:34:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x80000000, 0x9f3, 0x8000}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r2 = userfaultfd(0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80800) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000240)={0xb54, 0xa9d, &(0x7f00000000c0)="3479b77439a73bf76c07a192484f6a282a9a31af5764e44a14c99205a08f7cbc22c970534ee83722eaf8e888c3d9d5964622407be3ae0481f9b277d585b03ad7439cbacd859a2834576bc404986e4412204958291969fa92e58eb07863280a7ebc31f208aaae549f28b62c77eb8979f5262ba29f94e47b8e360b8129b8e4de9216a381924c1f35c86520704062a06db2518385a9f7ac586277ebaf2d60df57f59896664f6c2fffb83844e38abae9c12980295c73002988fe04e48c3208ee2540f600a8731120ed985ec43de4a2b5faf29c0be27424f568848f348b2119e309e3da7112eb47b78bee4f078edd9200", &(0x7f00000001c0)="994789b05704dd62534b072593a6ca8fcd98f742466ac71843a612cce27281582d42d9a81dc4c69ea6622ee6b4439c2caa6fced7844bada5527515462de042541e76732abb00977d146fc6238b98636d0fd4a4cd7fb48289af9629bc5680c69c876f1ad600c2fe0df63404022a46cbf597bfed1e20ca26eb", 0xee, 0x78}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:51 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 497.855015][ T4115] FAULT_INJECTION: forcing a failure. [ 497.855015][ T4115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.868285][ T4115] CPU: 0 PID: 4115 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 497.877304][ T4115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.877309][ T4115] Call Trace: [ 497.877335][ T4115] dump_stack+0x172/0x1f0 [ 497.877360][ T4115] should_fail.cold+0xa/0x15 [ 497.899915][ T4115] ? fault_create_debugfs_attr+0x180/0x180 [ 497.906915][ T4115] ? quarantine_put+0x11c/0x1c0 [ 497.911797][ T4115] should_fail_alloc_page+0x50/0x60 [ 497.917049][ T4115] __alloc_pages_nodemask+0x1a1/0x900 [ 497.922428][ T4115] ? putname+0xef/0x130 [ 497.922442][ T4115] ? __alloc_pages_slowpath+0x2520/0x2520 [ 497.922457][ T4115] ? filename_lookup+0x294/0x410 [ 497.922478][ T4115] ? fault_create_debugfs_attr+0x180/0x180 [ 497.937288][ T4115] ? nd_jump_link+0x1d0/0x1d0 [ 497.947763][ T4115] cache_grow_begin+0x90/0xd20 [ 497.952538][ T4115] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 497.952561][ T4115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 497.964814][ T4115] __kmalloc+0x6b2/0x770 [ 497.969119][ T4115] ? kmem_cache_alloc+0x314/0x710 [ 497.974154][ T4115] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 497.979862][ T4115] tomoyo_realpath_from_path+0xcd/0x7b0 [ 497.979877][ T4115] tomoyo_mount_acl+0x2cc/0x840 [ 497.979889][ T4115] ? __kasan_check_read+0x11/0x20 [ 497.979907][ T4115] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 498.000893][ T4115] ? debug_check_no_obj_freed+0xc0/0x43f [ 498.006536][ T4115] ? trace_hardirqs_off+0x62/0x240 [ 498.011704][ T4115] ? lock_acquire+0x190/0x410 [ 498.016399][ T4115] ? tomoyo_mount_permission+0x10a/0x410 [ 498.022042][ T4115] tomoyo_mount_permission+0x16a/0x410 [ 498.027635][ T4115] ? tomoyo_mount_permission+0x10a/0x410 [ 498.033278][ T4115] ? tomoyo_mount_acl+0x840/0x840 [ 498.038312][ T4115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 498.044567][ T4115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 498.044590][ T4115] ? strncpy_from_user+0x2b4/0x400 [ 498.055932][ T4115] tomoyo_sb_mount+0x35/0x40 [ 498.060547][ T4115] security_sb_mount+0x87/0xd0 [ 498.065332][ T4115] do_mount+0x1d4/0x1c30 [ 498.070824][ T4115] ? kasan_kmalloc+0x9/0x10 [ 498.075335][ T4115] ? copy_mount_string+0x40/0x40 [ 498.080288][ T4115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.086539][ T4115] ? copy_mount_options+0x2e8/0x3f0 [ 498.091747][ T4115] ksys_mount+0xdb/0x150 [ 498.096002][ T4115] __x64_sys_mount+0xbe/0x150 [ 498.100857][ T4115] do_syscall_64+0xfa/0x760 [ 498.105374][ T4115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.111271][ T4115] RIP: 0033:0x45c27a [ 498.115278][ T4115] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 498.134914][ T4115] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 498.143335][ T4115] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:34:51 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) 07:34:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x123) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000240)={0x9}, 0x109) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) 07:34:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x13, 0x100, 0x70bd25, 0x25dfdbff, {0x1a}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:51 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:51 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x26}) [ 498.151315][ T4115] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 498.159290][ T4115] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 498.167278][ T4115] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 498.175251][ T4115] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:51 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) close(r2) recvmmsg(r0, &(0x7f0000001000), 0x3fffffffffffefe, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000240)) [ 498.469472][ T4115] ISOFS: Unable to identify CD-ROM format. 07:34:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xfffff000}, 0x28) 07:34:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x4000)=nil, 0x4000}}) 07:34:52 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:34:52 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:52 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:52 executing program 1: socketpair$tipc(0x1e, 0x2000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f00000009c0)=""/24, 0x18) write$binfmt_elf32(r0, 0x0, 0x0) [ 499.095309][ T4154] FAULT_INJECTION: forcing a failure. [ 499.095309][ T4154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.108583][ T4154] CPU: 1 PID: 4154 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 499.117665][ T4154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.127737][ T4154] Call Trace: [ 499.131055][ T4154] dump_stack+0x172/0x1f0 [ 499.135398][ T4154] should_fail.cold+0xa/0x15 07:34:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x1fffffe}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:52 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 499.140243][ T4154] ? fault_create_debugfs_attr+0x180/0x180 [ 499.146150][ T4154] ? quarantine_put+0x11c/0x1c0 [ 499.151010][ T4154] should_fail_alloc_page+0x50/0x60 [ 499.156211][ T4154] __alloc_pages_nodemask+0x1a1/0x900 [ 499.161634][ T4154] ? putname+0xef/0x130 [ 499.165799][ T4154] ? __alloc_pages_slowpath+0x2520/0x2520 [ 499.171538][ T4154] ? filename_lookup+0x294/0x410 [ 499.176581][ T4154] ? fault_create_debugfs_attr+0x180/0x180 [ 499.182412][ T4154] ? nd_jump_link+0x1d0/0x1d0 [ 499.187105][ T4154] cache_grow_begin+0x90/0xd20 07:34:52 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000200)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r3 = getgid() fchown(r1, r2, r3) [ 499.191891][ T4154] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 499.197633][ T4154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.203887][ T4154] __kmalloc+0x6b2/0x770 [ 499.208125][ T4154] ? kmem_cache_alloc+0x314/0x710 [ 499.208143][ T4154] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 499.208156][ T4154] tomoyo_realpath_from_path+0xcd/0x7b0 [ 499.208173][ T4154] tomoyo_mount_acl+0x2cc/0x840 [ 499.229304][ T4154] ? __kasan_check_read+0x11/0x20 [ 499.234346][ T4154] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 499.239921][ T4154] ? debug_check_no_obj_freed+0xc0/0x43f [ 499.245730][ T4154] ? trace_hardirqs_off+0x62/0x240 [ 499.250856][ T4154] ? lock_acquire+0x190/0x410 [ 499.255526][ T4154] ? tomoyo_mount_permission+0x10a/0x410 [ 499.261148][ T4154] tomoyo_mount_permission+0x16a/0x410 [ 499.266590][ T4154] ? tomoyo_mount_permission+0x10a/0x410 [ 499.272204][ T4154] ? tomoyo_mount_acl+0x840/0x840 [ 499.277211][ T4154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.283532][ T4154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.289941][ T4154] ? strncpy_from_user+0x2b4/0x400 [ 499.295038][ T4154] tomoyo_sb_mount+0x35/0x40 [ 499.299614][ T4154] security_sb_mount+0x87/0xd0 [ 499.304372][ T4154] do_mount+0x1d4/0x1c30 [ 499.308598][ T4154] ? kasan_kmalloc+0x9/0x10 [ 499.313112][ T4154] ? copy_mount_string+0x40/0x40 [ 499.318038][ T4154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.324264][ T4154] ? copy_mount_options+0x2e8/0x3f0 [ 499.329472][ T4154] ksys_mount+0xdb/0x150 [ 499.333703][ T4154] __x64_sys_mount+0xbe/0x150 [ 499.338455][ T4154] do_syscall_64+0xfa/0x760 [ 499.342950][ T4154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.348852][ T4154] RIP: 0033:0x45c27a [ 499.352739][ T4154] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 499.372602][ T4154] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 499.381009][ T4154] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 499.388967][ T4154] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 499.396929][ T4154] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 499.404975][ T4154] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 499.412932][ T4154] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 499.435059][ T4154] ISOFS: Unable to identify CD-ROM format. 07:34:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000040)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:52 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 07:34:52 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xfffffffe}, 0x28) 07:34:52 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getdents64(r1, &(0x7f0000000000)=""/17, 0x11) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:34:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6ba, 0x410000) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000100)=@gcm_128={{}, "5b65672cf0adddf5", "cf416db667e5a3708327aad24c2027d3", "f1cd8a55", "c7f503f0c75b7527"}, 0x28) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) [ 499.599089][ T4179] FAULT_INJECTION: forcing a failure. [ 499.599089][ T4179] name failslab, interval 1, probability 0, space 0, times 0 [ 499.657091][ T4179] CPU: 0 PID: 4179 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 499.666178][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.676247][ T4179] Call Trace: [ 499.679573][ T4179] dump_stack+0x172/0x1f0 [ 499.683943][ T4179] should_fail.cold+0xa/0x15 [ 499.688565][ T4179] ? fault_create_debugfs_attr+0x180/0x180 [ 499.694488][ T4179] ? ___might_sleep+0x163/0x280 [ 499.699362][ T4179] __should_failslab+0x121/0x190 [ 499.704323][ T4179] should_failslab+0x9/0x14 [ 499.708839][ T4179] __kmalloc+0x2e0/0x770 [ 499.713090][ T4179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.719338][ T4179] ? d_absolute_path+0x11b/0x170 [ 499.724279][ T4179] ? __d_path+0x140/0x140 [ 499.728611][ T4179] ? tomoyo_encode2.part.0+0xf5/0x400 [ 499.733999][ T4179] tomoyo_encode2.part.0+0xf5/0x400 [ 499.740756][ T4179] tomoyo_encode+0x2b/0x50 [ 499.745192][ T4179] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 499.750849][ T4179] tomoyo_mount_acl+0x2cc/0x840 [ 499.755707][ T4179] ? __kasan_check_read+0x11/0x20 [ 499.760744][ T4179] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 499.766302][ T4179] ? debug_check_no_obj_freed+0xc0/0x43f [ 499.771951][ T4179] ? trace_hardirqs_off+0x62/0x240 [ 499.777192][ T4179] ? lock_acquire+0x190/0x410 [ 499.781899][ T4179] ? tomoyo_mount_permission+0x10a/0x410 [ 499.787567][ T4179] tomoyo_mount_permission+0x16a/0x410 [ 499.793043][ T4179] ? tomoyo_mount_permission+0x10a/0x410 [ 499.798696][ T4179] ? tomoyo_mount_acl+0x840/0x840 [ 499.803813][ T4179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.810057][ T4179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.816308][ T4179] ? strncpy_from_user+0x2b4/0x400 [ 499.821421][ T4179] tomoyo_sb_mount+0x35/0x40 [ 499.826043][ T4179] security_sb_mount+0x87/0xd0 [ 499.830870][ T4179] do_mount+0x1d4/0x1c30 [ 499.835200][ T4179] ? copy_mount_string+0x40/0x40 [ 499.840136][ T4179] ? copy_mount_options+0x270/0x3f0 [ 499.845337][ T4179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.851571][ T4179] ? copy_mount_options+0x2e8/0x3f0 [ 499.856768][ T4179] ksys_mount+0xdb/0x150 [ 499.861012][ T4179] __x64_sys_mount+0xbe/0x150 [ 499.865723][ T4179] do_syscall_64+0xfa/0x760 [ 499.870294][ T4179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.876179][ T4179] RIP: 0033:0x45c27a [ 499.880083][ T4179] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:34:52 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast, r1}) 07:34:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000080)="9d", 0xfffff, r1) 07:34:53 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x187002) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/114) 07:34:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 499.899854][ T4179] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 499.909185][ T4179] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 499.917164][ T4179] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 499.925131][ T4179] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 499.933098][ T4179] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 499.941071][ T4179] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000013, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:53 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f0000000000)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x1c0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000080)=0xd3) 07:34:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 500.149521][ T4179] ERROR: Out of memory at tomoyo_realpath_from_path. 07:34:53 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x8000a0ffffffff}, 0x28) 07:34:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000001c0)={0x3, @bcast, r1}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r2, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 500.408116][ T4210] FAULT_INJECTION: forcing a failure. [ 500.408116][ T4210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.421490][ T4210] CPU: 1 PID: 4210 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 500.430537][ T4210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.440701][ T4210] Call Trace: [ 500.444105][ T4210] dump_stack+0x172/0x1f0 [ 500.448496][ T4210] should_fail.cold+0xa/0x15 [ 500.453102][ T4210] ? fault_create_debugfs_attr+0x180/0x180 [ 500.459360][ T4210] ? mark_held_locks+0xf0/0xf0 [ 500.459375][ T4210] ? lock_downgrade+0x920/0x920 [ 500.459396][ T4210] should_fail_alloc_page+0x50/0x60 [ 500.459409][ T4210] __alloc_pages_nodemask+0x1a1/0x900 [ 500.459422][ T4210] ? mark_held_locks+0xf0/0xf0 [ 500.459436][ T4210] ? blkdev_get+0xfc/0x290 [ 500.459454][ T4210] ? __alloc_pages_slowpath+0x2520/0x2520 [ 500.497162][ T4210] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 500.497183][ T4210] ? __kasan_check_read+0x11/0x20 [ 500.507926][ T4210] ? fault_create_debugfs_attr+0x180/0x180 [ 500.513748][ T4210] cache_grow_begin+0x90/0xd20 [ 500.518788][ T4210] ? alloc_super+0x55/0x890 [ 500.523288][ T4210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 500.529636][ T4210] kmem_cache_alloc_trace+0x6b3/0x790 [ 500.535085][ T4210] ? __kasan_check_write+0x14/0x20 [ 500.540294][ T4210] alloc_super+0x55/0x890 [ 500.544962][ T4210] ? __kasan_check_read+0x11/0x20 [ 500.549985][ T4210] ? test_bdev_super_fc+0x80/0x80 [ 500.554998][ T4210] sget+0x117/0x560 [ 500.558805][ T4210] ? set_bdev_super_fc+0x210/0x210 [ 500.563906][ T4210] mount_bdev+0xff/0x3c0 [ 500.568133][ T4210] ? isofs_bread+0xe0/0xe0 [ 500.572661][ T4210] isofs_mount+0x35/0x40 [ 500.576885][ T4210] ? isofs_readpage+0x30/0x30 [ 500.581548][ T4210] legacy_get_tree+0x113/0x220 [ 500.586317][ T4210] ? ns_capable_common+0x93/0x100 [ 500.591347][ T4210] vfs_get_tree+0x8f/0x380 [ 500.595750][ T4210] do_mount+0x13b3/0x1c30 [ 500.600070][ T4210] ? copy_mount_string+0x40/0x40 [ 500.605020][ T4210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.611336][ T4210] ? copy_mount_options+0x2e8/0x3f0 [ 500.617220][ T4210] ksys_mount+0xdb/0x150 [ 500.621651][ T4210] __x64_sys_mount+0xbe/0x150 [ 500.626746][ T4210] do_syscall_64+0xfa/0x760 [ 500.631255][ T4210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.637135][ T4210] RIP: 0033:0x45c27a [ 500.641715][ T4210] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 500.661394][ T4210] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 500.669880][ T4210] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 500.678208][ T4210] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 500.686168][ T4210] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 500.694142][ T4210] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:34:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80, 0x0) sendto$unix(r1, &(0x7f0000000100)="649a2cfa202ad9660dcd5dc3f7df37eb15cbc176bb70e1bb08b032a4e693edff04154721d3a5d7f1dceacb056d9af558e7c5bb9922c5f6f37de9ae728e20db9de2822da4c587d895d567dd703197097f1bd6f51e9c9db01031649377594d6157c6d2d892e8f0445a0a6242025adad12477ba483d02db2c5cfbb65090205c958e55fa6fc91109c502fa25cc5ea06d8531c57199f882474e65564c35471c21549ac487a25612300d", 0xa7, 0xc000, 0x0, 0x0) r2 = userfaultfd(0x80800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x200) setsockopt$inet6_int(r3, 0x29, 0x3e, &(0x7f0000000080)=0x8, 0x4) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x25}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 07:34:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 07:34:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:54 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89ea, &(0x7f0000000000)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) [ 500.702358][ T4210] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 500.720769][ T4210] ISOFS: Unable to identify CD-ROM format. 07:34:54 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000011000/0x2000)=nil, &(0x7f0000011000/0x4000)=nil, 0x2000, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = dup(r0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$PPPIOCDISCONN(r2, 0x7439) 07:34:54 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x6900, 0x8, &(0x7f0000000200)) fchmod(r0, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/141, 0x8d, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) 07:34:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xf0ffffffffffff}, 0x28) 07:34:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 07:34:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 500.898559][ T4238] FAULT_INJECTION: forcing a failure. [ 500.898559][ T4238] name failslab, interval 1, probability 0, space 0, times 0 [ 500.934688][ T4238] CPU: 1 PID: 4238 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 07:34:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x800) r1 = gettid() fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x3, 0x8001, 0x0, r1}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r2, 0x89ea, &(0x7f0000000000)={0x3, @bcast}) 07:34:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 500.944365][ T4238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.954431][ T4238] Call Trace: [ 500.957763][ T4238] dump_stack+0x172/0x1f0 [ 500.962116][ T4238] should_fail.cold+0xa/0x15 [ 500.966733][ T4238] ? fault_create_debugfs_attr+0x180/0x180 [ 500.972561][ T4238] ? page_to_nid.part.0+0x20/0x20 [ 500.977620][ T4238] ? ___might_sleep+0x163/0x280 [ 500.982516][ T4238] __should_failslab+0x121/0x190 [ 500.987470][ T4238] should_failslab+0x9/0x14 [ 500.991993][ T4238] kmem_cache_alloc_trace+0x2d3/0x790 [ 500.997382][ T4238] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 501.003207][ T4238] __memcg_init_list_lru_node+0x8a/0x1e0 [ 501.008876][ T4238] __list_lru_init+0x3fe/0x710 [ 501.013667][ T4238] alloc_super+0x762/0x890 [ 501.018100][ T4238] ? test_bdev_super_fc+0x80/0x80 [ 501.023151][ T4238] sget+0x117/0x560 [ 501.026992][ T4238] ? set_bdev_super_fc+0x210/0x210 [ 501.032126][ T4238] mount_bdev+0xff/0x3c0 [ 501.036382][ T4238] ? isofs_bread+0xe0/0xe0 [ 501.040809][ T4238] isofs_mount+0x35/0x40 07:34:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 501.040821][ T4238] ? isofs_readpage+0x30/0x30 [ 501.040836][ T4238] legacy_get_tree+0x113/0x220 [ 501.040851][ T4238] ? ns_capable_common+0x93/0x100 [ 501.040868][ T4238] vfs_get_tree+0x8f/0x380 [ 501.040884][ T4238] do_mount+0x13b3/0x1c30 [ 501.040905][ T4238] ? copy_mount_string+0x40/0x40 [ 501.054841][ T4238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 501.054862][ T4238] ? _copy_from_user+0x12c/0x1a0 [ 501.084665][ T4238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.084680][ T4238] ? copy_mount_options+0x2e8/0x3f0 07:34:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x8) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000080)) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e24, @remote}, 0x56afd3d6dcc35c7b, 0x0, 0x0, 0x0, 0x10000, &(0x7f00000000c0)='bpq0\x00', 0x8001, 0x3, 0x4}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:54 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xa001, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x80000000, 0x8000}, 0x8) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000080)={0x4, {0x8, 0x200000007, 0x9, 0x4, 0x40, 0x8}}) fcntl$setflags(r0, 0x2, 0x1) [ 501.084698][ T4238] ksys_mount+0xdb/0x150 [ 501.100634][ T4238] __x64_sys_mount+0xbe/0x150 [ 501.105324][ T4238] do_syscall_64+0xfa/0x760 [ 501.109853][ T4238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.115755][ T4238] RIP: 0033:0x45c27a [ 501.119663][ T4238] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.139275][ T4238] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 501.147723][ T4238] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 501.147731][ T4238] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 501.147746][ T4238] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 501.171840][ T4238] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 501.179823][ T4238] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:54 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 07:34:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x4bb5b7274e4e5c07) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20003, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000040)) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0xfffffffffffffffa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x3}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x3}) [ 501.605725][ T4276] FAULT_INJECTION: forcing a failure. [ 501.605725][ T4276] name failslab, interval 1, probability 0, space 0, times 0 [ 501.644058][ T4276] CPU: 0 PID: 4276 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 501.653152][ T4276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.663214][ T4276] Call Trace: [ 501.666523][ T4276] dump_stack+0x172/0x1f0 [ 501.670853][ T4276] should_fail.cold+0xa/0x15 [ 501.675446][ T4276] ? fault_create_debugfs_attr+0x180/0x180 [ 501.681252][ T4276] ? page_to_nid.part.0+0x20/0x20 [ 501.681268][ T4276] ? ___might_sleep+0x163/0x280 [ 501.681290][ T4276] __should_failslab+0x121/0x190 [ 501.696073][ T4276] should_failslab+0x9/0x14 [ 501.700576][ T4276] __kmalloc_track_caller+0x2dc/0x760 [ 501.705951][ T4276] ? kasan_unpoison_shadow+0x35/0x50 [ 501.711246][ T4276] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 501.717061][ T4276] ? vfs_parse_fs_string+0xe8/0x170 [ 501.717083][ T4276] kmemdup_nul+0x31/0xa0 [ 501.726925][ T4276] vfs_parse_fs_string+0xe8/0x170 [ 501.731941][ T4276] ? vfs_parse_fs_param+0x540/0x540 [ 501.738691][ T4276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.744932][ T4276] ? alloc_fs_context+0x434/0x6d0 [ 501.749959][ T4276] do_mount+0x700/0x1c30 [ 501.754208][ T4276] ? copy_mount_string+0x40/0x40 [ 501.759139][ T4276] ? copy_mount_options+0x270/0x3f0 [ 501.764340][ T4276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.770577][ T4276] ? copy_mount_options+0x2e8/0x3f0 [ 501.775772][ T4276] ksys_mount+0xdb/0x150 [ 501.780018][ T4276] __x64_sys_mount+0xbe/0x150 [ 501.784703][ T4276] do_syscall_64+0xfa/0x760 [ 501.789230][ T4276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.795136][ T4276] RIP: 0033:0x45c27a [ 501.799035][ T4276] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.819003][ T4276] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 501.827420][ T4276] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 501.835485][ T4276] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 501.843460][ T4276] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 07:34:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x100000000000000}, 0x28) 07:34:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:55 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000000c0)={0x1, "a89ad0480c5dc14b62176bf15c3e3caafb452ff2d8ab1c20846f2f89578f704f", 0x1, 0x1}) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x7, 0x4) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000000)={0x7e, "8a3b4a5407ef23a69fc48d687d4dcd6575da4d60332312b92cb14527a33cc14a", 0x3, 0x7, 0x0, 0xc04008}) fcntl$setsig(r0, 0xa, 0x26) 07:34:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 07:34:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000180)=0x3, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 501.851424][ T4276] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 501.859388][ T4276] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x20000000000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x4e22, @broadcast}}) 07:34:55 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 07:34:55 executing program 2: ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x12000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040), 0x4) 07:34:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x200000000000000}, 0x28) 07:34:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 502.038412][ T4296] FAULT_INJECTION: forcing a failure. [ 502.038412][ T4296] name failslab, interval 1, probability 0, space 0, times 0 07:34:55 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x80, 0x101000) r2 = geteuid() getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r2}, {0x2, 0x4, r2}, {0x2, 0x4, r6}, {0x2, 0x2, r2}, {0x2, 0x4, r2}, {0x2, 0x1, r2}], {0x4, 0x2}, [{0x8, 0x4, r4}, {0x8, 0x2, r5}, {0x8, 0x2, r5}], {}, {0x20, 0x1}}, 0x6c, 0x3) write$FUSE_ATTR(r1, &(0x7f0000000100)={0x78, 0xfffffffffffffffe, 0x1, {0x7, 0xfff00, 0x0, {0x4, 0x3, 0x80000000, 0x3ff, 0x1, 0x3ff, 0xe6, 0xffffffff80000000, 0xfffffffffffffffe, 0x8, 0x5, r2, r3, 0x200, 0x80}}}, 0x78) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 502.092161][ T4296] CPU: 1 PID: 4296 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 502.092177][ T4296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.111658][ T4296] Call Trace: [ 502.114975][ T4296] dump_stack+0x172/0x1f0 [ 502.119420][ T4296] should_fail.cold+0xa/0x15 [ 502.124067][ T4296] ? fault_create_debugfs_attr+0x180/0x180 [ 502.129906][ T4296] ? page_to_nid.part.0+0x20/0x20 [ 502.134986][ T4296] ? ___might_sleep+0x163/0x280 [ 502.139856][ T4296] __should_failslab+0x121/0x190 [ 502.144803][ T4296] should_failslab+0x9/0x14 [ 502.144822][ T4296] __kmalloc_track_caller+0x2dc/0x760 [ 502.154838][ T4296] ? kasan_unpoison_shadow+0x35/0x50 [ 502.160131][ T4296] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 502.165937][ T4296] ? vfs_parse_fs_string+0xe8/0x170 [ 502.171148][ T4296] kmemdup_nul+0x31/0xa0 [ 502.175404][ T4296] vfs_parse_fs_string+0xe8/0x170 [ 502.180434][ T4296] ? vfs_parse_fs_param+0x540/0x540 [ 502.185646][ T4296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:34:55 executing program 2: ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x200) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@name, &(0x7f00000002c0)=0x10, 0x80800) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x40000, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x80000000088000, 0xd1) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f00000008c0)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x800) r6 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r7 = getpid() stat(&(0x7f0000000ac0)='\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000b80)=[0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff]) r10 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0, 0x0}, &(0x7f0000000d40)=0xc) fcntl$getownex(r2, 0x10, &(0x7f0000000d80)={0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r15 = getegid() r16 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000e40)={0x0, 0x0}, &(0x7f0000000e80)=0xc) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = fcntl$getown(r3, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000001080)=0xe8) getgroups(0x2, &(0x7f00000010c0)=[0xffffffffffffffff, 0xffffffffffffffff]) sendmsg$unix(r2, &(0x7f0000001240)={&(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000009c0)="532d7082834b44c4d0efe3ac8915485214aecd93d2370ccf21ddb5cbe331e547a8dba1749373626e968ea46262e39a74eec5f31b43902550ef7f30cd0658373ca1b8132f68ab89de3b5ea5b5fcf1678bf6525e6fa8a902487b8cfb90b3db31c56528e00845dca14ebbd6f8f2764e0f349212e1e8dfb55d05c75d827a410d57031b5ce797d3de41e0214ac1749f", 0x8d}], 0x1, &(0x7f0000001100)=[@rights={{0x2c, 0x1, 0x1, [r5, r3, r0, r2, r3, r4, r1]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r6, r5, r5]}}, @rights={{0x20, 0x1, 0x1, [r1, r5, r3, r5]}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}], 0x128, 0x4000000}, 0x8000) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000003c0)={0x5, 0x9, 0x4, 0x60000000, {}, {0x3, 0x1, 0x10001, 0xc6, 0x4, 0x2, "bf9331b0"}, 0x1, 0x2, @fd=0xffffffffffffffff, 0x4}) r23 = syz_init_net_socket$ax25(0x3, 0x7, 0xcf) r24 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x280200, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$can_raw(0x1d, 0x3, 0x1) r29 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) r31 = getgid() r32 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000900)={0x9, 0x7, 0x10000, 0x4, 'syz1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) r34 = getegid() sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="40ec456847adceb76bbb1ff52a023c14a238e667069772a7876a6cd1cfd9562cc6a55a8cba0c56487a8732515903ae2c83e621e9befa7afffe173258414460ef28e43f0fc60b5f6c7827abc07ba2e8dfd21a93d8cc33b07e4b", 0x59}, {&(0x7f0000000140)="e4faf0849732d0dc537b08b5767dee3a61228a9064a2b518a60ad58e7304d2859a855adb99ec64995401d21f3d67dce9b47dd4f6c7c9916a6c449853bbcb4796edda94f166c6dd79bbcad0940f9a952d0c50e85583c10ea201dba866b20da13e81b20060a0a75163f2bb1ffbd91abc4ee26f974a28d860928080a42ee49b45d326069fc0078f253f162be1d19d2650e4b50144d2cdfaede7a39bf3e1a835d2b48c2a8bb8a13b8967a7f1ac29b2fcc211adc98578bae78a25ba17e23a10e382729eaeac2f6c34579c4c4bff3bb2393144bba96c1f86260073d9092c322181332ffb81f7e2441b494b6887d0d2", 0xec}], 0x2, &(0x7f00000007c0)=[@rights={{0x30, 0x1, 0x1, [r1, r2, r3, r4, r5, r22, r23, r24]}}, @cred={{0x1c, 0x1, 0x2, {r25, r26, r27}}}, @rights={{0x14, 0x1, 0x1, [r28]}}, @cred={{0x1c, 0x1, 0x2, {r29, r30, r31}}}, @cred={{0x1c, 0x1, 0x2, {r32, r33, r34}}}], 0xa8}, 0x0) [ 502.191902][ T4296] ? alloc_fs_context+0x434/0x6d0 [ 502.196942][ T4296] do_mount+0x700/0x1c30 [ 502.201204][ T4296] ? copy_mount_string+0x40/0x40 [ 502.206158][ T4296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.213810][ T4296] ? copy_mount_options+0x2e8/0x3f0 [ 502.219032][ T4296] ksys_mount+0xdb/0x150 [ 502.223290][ T4296] __x64_sys_mount+0xbe/0x150 [ 502.227983][ T4296] do_syscall_64+0xfa/0x760 [ 502.232511][ T4296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.239054][ T4296] RIP: 0033:0x45c27a 07:34:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) mmap(&(0x7f0000ff3000/0xa000)=nil, 0xa000, 0x0, 0x12, r0, 0x0) r1 = userfaultfd(0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100)=0x7, 0x4) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x40001) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000015000/0x1000)=nil, 0x1000}, 0xfffbfffffffffffe}) [ 502.242957][ T4296] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 502.262568][ T4296] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 502.262583][ T4296] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 502.262591][ T4296] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:34:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) recvmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/236, 0xec}], 0x1, &(0x7f0000000240)}, 0x0) 07:34:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x3f00000000000000}, 0x28) [ 502.262599][ T4296] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 502.262605][ T4296] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 502.262611][ T4296] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 07:34:55 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) fstatfs(r0, &(0x7f0000000000)=""/5) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:55 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000001, 0x0) write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x100000000002001}, 0x7) r2 = socket$kcm(0x11, 0x7, 0x300) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f00000001c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)='m', 0x1}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000680)=@can={0x1d, 0x0}, 0x2e5, 0x0, 0x0, 0x0, 0x3bc}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0x3, &(0x7f0000000f00)=ANY=[@ANYBLOB="18000000000000000000001f1e0000009500000200080400"], &(0x7f0000000f80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x4000000000000000}, 0x28) 07:34:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 07:34:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 502.501277][ T4333] FAULT_INJECTION: forcing a failure. [ 502.501277][ T4333] name failslab, interval 1, probability 0, space 0, times 0 [ 502.573351][ T4333] CPU: 0 PID: 4333 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 502.582438][ T4333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.592507][ T4333] Call Trace: [ 502.595818][ T4333] dump_stack+0x172/0x1f0 [ 502.600164][ T4333] should_fail.cold+0xa/0x15 [ 502.604768][ T4333] ? fault_create_debugfs_attr+0x180/0x180 [ 502.610588][ T4333] ? page_to_nid.part.0+0x20/0x20 [ 502.615632][ T4333] ? ___might_sleep+0x163/0x280 [ 502.620492][ T4333] __should_failslab+0x121/0x190 [ 502.625434][ T4333] should_failslab+0x9/0x14 [ 502.629943][ T4333] kmem_cache_alloc_trace+0x2d3/0x790 [ 502.635327][ T4333] ? __kasan_check_write+0x14/0x20 [ 502.640450][ T4333] ? lock_downgrade+0x920/0x920 [ 502.645318][ T4333] ? rwlock_bug.part.0+0x90/0x90 [ 502.650354][ T4333] alloc_super+0x55/0x890 [ 502.654689][ T4333] ? __kasan_check_read+0x11/0x20 [ 502.659721][ T4333] ? test_bdev_super_fc+0x80/0x80 [ 502.664748][ T4333] sget+0x117/0x560 [ 502.668543][ T4333] ? set_bdev_super_fc+0x210/0x210 [ 502.673647][ T4333] mount_bdev+0xff/0x3c0 [ 502.677875][ T4333] ? isofs_bread+0xe0/0xe0 [ 502.682278][ T4333] isofs_mount+0x35/0x40 [ 502.686503][ T4333] ? isofs_readpage+0x30/0x30 [ 502.691161][ T4333] legacy_get_tree+0x113/0x220 [ 502.695905][ T4333] ? ns_capable_common+0x93/0x100 [ 502.700912][ T4333] vfs_get_tree+0x8f/0x380 [ 502.705311][ T4333] do_mount+0x13b3/0x1c30 [ 502.709627][ T4333] ? copy_mount_string+0x40/0x40 [ 502.714553][ T4333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.720775][ T4333] ? copy_mount_options+0x2e8/0x3f0 [ 502.725962][ T4333] ksys_mount+0xdb/0x150 [ 502.730185][ T4333] __x64_sys_mount+0xbe/0x150 [ 502.735363][ T4333] do_syscall_64+0xfa/0x760 [ 502.739858][ T4333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.745839][ T4333] RIP: 0033:0x45c27a [ 502.749718][ T4333] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:34:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x40}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x90) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = msgget(0x1, 0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r4, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x59}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf38}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000015) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000380)={{0x3, 0x3, 0x7f, 0x2, 0x682}}) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000000)=""/182) 07:34:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xfeffffff00000000}, 0x28) 07:34:55 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20000, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r2}) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 502.769388][ T4333] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 502.777778][ T4333] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 502.785997][ T4333] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 502.793949][ T4333] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 502.801908][ T4333] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 502.809973][ T4333] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000280)=""/185, &(0x7f0000000340)=0xb9) 07:34:56 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 07:34:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000fee000/0x10000)=nil, 0x10000}, 0x1}) 07:34:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xffffffffa0008000}, 0x28) 07:34:56 executing program 2: r0 = socket(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000000)={0x1, 'syz0\x00'}) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) 07:34:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r2 = userfaultfd(0x800000000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000180)={'Vcm\x00\x00\x00\x00\xf3?\x84\xf2!\xf8\t\v\x00\x00\x00\x00\x00\xdd\xff\xff\xff\x00'}, &(0x7f00000001c0)=0x1e) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x1}) 07:34:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89ea, &(0x7f00000019c0)={0x3, @bcast}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, r2}}, 0x30) 07:34:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 07:34:56 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003", 0x17}], 0x1}, 0x0) [ 503.190740][ T4378] FAULT_INJECTION: forcing a failure. [ 503.190740][ T4378] name failslab, interval 1, probability 0, space 0, times 0 [ 503.239164][ T4378] CPU: 1 PID: 4378 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 503.248252][ T4378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.258352][ T4378] Call Trace: [ 503.261656][ T4378] dump_stack+0x172/0x1f0 [ 503.261674][ T4378] should_fail.cold+0xa/0x15 [ 503.261690][ T4378] ? fault_create_debugfs_attr+0x180/0x180 [ 503.261710][ T4378] ? page_to_nid.part.0+0x20/0x20 [ 503.261724][ T4378] ? ___might_sleep+0x163/0x280 [ 503.261744][ T4378] __should_failslab+0x121/0x190 [ 503.291584][ T4378] should_failslab+0x9/0x14 [ 503.296101][ T4378] kmem_cache_alloc_trace+0x2d3/0x790 [ 503.301474][ T4378] ? __kasan_check_write+0x14/0x20 [ 503.306589][ T4378] ? lock_downgrade+0x920/0x920 [ 503.312910][ T4378] ? rwlock_bug.part.0+0x90/0x90 [ 503.312929][ T4378] alloc_super+0x55/0x890 [ 503.312940][ T4378] ? __kasan_check_read+0x11/0x20 [ 503.312951][ T4378] ? test_bdev_super_fc+0x80/0x80 [ 503.312963][ T4378] sget+0x117/0x560 [ 503.312974][ T4378] ? set_bdev_super_fc+0x210/0x210 [ 503.312988][ T4378] mount_bdev+0xff/0x3c0 [ 503.313007][ T4378] ? isofs_bread+0xe0/0xe0 [ 503.349782][ T4378] isofs_mount+0x35/0x40 [ 503.354029][ T4378] ? isofs_readpage+0x30/0x30 [ 503.358710][ T4378] legacy_get_tree+0x113/0x220 [ 503.363476][ T4378] ? ns_capable_common+0x93/0x100 [ 503.368499][ T4378] vfs_get_tree+0x8f/0x380 [ 503.373008][ T4378] do_mount+0x13b3/0x1c30 [ 503.377341][ T4378] ? copy_mount_string+0x40/0x40 [ 503.382366][ T4378] ? copy_mount_options+0x241/0x3f0 [ 503.387571][ T4378] ? copy_mount_options+0x24d/0x3f0 [ 503.392775][ T4378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.399015][ T4378] ? copy_mount_options+0x2e8/0x3f0 [ 503.404218][ T4378] ksys_mount+0xdb/0x150 [ 503.408459][ T4378] __x64_sys_mount+0xbe/0x150 [ 503.413150][ T4378] do_syscall_64+0xfa/0x760 [ 503.417675][ T4378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.423743][ T4378] RIP: 0033:0x45c27a [ 503.427652][ T4378] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 503.447257][ T4378] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 503.455694][ T4378] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 503.464077][ T4378] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 503.472051][ T4378] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 503.480023][ T4378] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 503.488075][ T4378] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:56 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40000) recvfrom$unix(r1, &(0x7f0000000100)=""/251, 0xfb, 0x140, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000000)={0x1}) r2 = userfaultfd(0x8ff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x420f, r3) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) finit_module(r0, &(0x7f0000000040)='-vmnet0\x00', 0x1) 07:34:56 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003", 0x17}], 0x1}, 0x0) [ 503.627918][ T4404] FAULT_INJECTION: forcing a failure. [ 503.627918][ T4404] name failslab, interval 1, probability 0, space 0, times 0 [ 503.646340][ T4404] CPU: 1 PID: 4404 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 503.655428][ T4404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.665488][ T4404] Call Trace: [ 503.665517][ T4404] dump_stack+0x172/0x1f0 [ 503.665534][ T4404] should_fail.cold+0xa/0x15 [ 503.665549][ T4404] ? fault_create_debugfs_attr+0x180/0x180 [ 503.665569][ T4404] ? page_to_nid.part.0+0x20/0x20 [ 503.665589][ T4404] ? ___might_sleep+0x163/0x280 [ 503.693493][ T4404] __should_failslab+0x121/0x190 [ 503.698444][ T4404] should_failslab+0x9/0x14 [ 503.702966][ T4404] kmem_cache_alloc_trace+0x2d3/0x790 [ 503.708339][ T4404] ? __kasan_check_write+0x14/0x20 [ 503.713455][ T4404] ? lock_downgrade+0x920/0x920 [ 503.718292][ T4404] ? rwlock_bug.part.0+0x90/0x90 [ 503.723237][ T4404] alloc_super+0x55/0x890 [ 503.727563][ T4404] ? __kasan_check_read+0x11/0x20 [ 503.732589][ T4404] ? test_bdev_super_fc+0x80/0x80 [ 503.738825][ T4404] sget+0x117/0x560 [ 503.742643][ T4404] ? set_bdev_super_fc+0x210/0x210 [ 503.747750][ T4404] mount_bdev+0xff/0x3c0 [ 503.751992][ T4404] ? isofs_bread+0xe0/0xe0 [ 503.756415][ T4404] isofs_mount+0x35/0x40 [ 503.760657][ T4404] ? isofs_readpage+0x30/0x30 [ 503.765334][ T4404] legacy_get_tree+0x113/0x220 [ 503.770099][ T4404] ? ns_capable_common+0x93/0x100 [ 503.775124][ T4404] vfs_get_tree+0x8f/0x380 [ 503.779548][ T4404] do_mount+0x13b3/0x1c30 [ 503.783893][ T4404] ? copy_mount_string+0x40/0x40 [ 503.788854][ T4404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.795102][ T4404] ? copy_mount_options+0x2e8/0x3f0 [ 503.800302][ T4404] ksys_mount+0xdb/0x150 [ 503.804545][ T4404] __x64_sys_mount+0xbe/0x150 [ 503.809236][ T4404] do_syscall_64+0xfa/0x760 [ 503.813752][ T4404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.819648][ T4404] RIP: 0033:0x45c27a [ 503.823549][ T4404] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 503.850371][ T4404] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 503.858792][ T4404] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 503.866773][ T4404] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:34:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0xfffffffffffff000}, 0x28) 07:34:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = semget$private(0x0, 0x10003, 0x11) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000000)=""/137) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) semctl$SETALL(r2, 0x0, 0x11, &(0x7f00000000c0)=[0x7fff]) 07:34:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003", 0x17}], 0x1}, 0x0) 07:34:57 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 503.874920][ T4404] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 503.882992][ T4404] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 503.890969][ T4404] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:57 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000", 0x23}], 0x1}, 0x0) 07:34:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x80000000, 0x802) 07:34:57 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) unlink(&(0x7f0000000040)='./bus\x00') 07:34:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 504.487843][ T4421] FAULT_INJECTION: forcing a failure. [ 504.487843][ T4421] name failslab, interval 1, probability 0, space 0, times 0 [ 504.509498][ T4421] CPU: 1 PID: 4421 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 504.518585][ T4421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.528654][ T4421] Call Trace: [ 504.531966][ T4421] dump_stack+0x172/0x1f0 [ 504.536327][ T4421] should_fail.cold+0xa/0x15 [ 504.541207][ T4421] ? fault_create_debugfs_attr+0x180/0x180 [ 504.547029][ T4421] ? page_to_nid.part.0+0x20/0x20 [ 504.552059][ T4421] ? ___might_sleep+0x163/0x280 [ 504.552083][ T4421] __should_failslab+0x121/0x190 [ 504.561951][ T4421] should_failslab+0x9/0x14 [ 504.566461][ T4421] __kmalloc+0x2e0/0x770 [ 504.566479][ T4421] ? lockdep_init_map+0x1be/0x6d0 [ 504.566500][ T4421] ? prealloc_shrinker+0xa6/0x350 [ 504.581013][ T4421] prealloc_shrinker+0xa6/0x350 [ 504.585882][ T4421] alloc_super+0x710/0x890 [ 504.590321][ T4421] ? test_bdev_super_fc+0x80/0x80 [ 504.595349][ T4421] sget+0x117/0x560 [ 504.595361][ T4421] ? set_bdev_super_fc+0x210/0x210 [ 504.595378][ T4421] mount_bdev+0xff/0x3c0 [ 504.608511][ T4421] ? isofs_bread+0xe0/0xe0 [ 504.612930][ T4421] isofs_mount+0x35/0x40 [ 504.617181][ T4421] ? isofs_readpage+0x30/0x30 [ 504.621866][ T4421] legacy_get_tree+0x113/0x220 [ 504.626630][ T4421] ? ns_capable_common+0x93/0x100 [ 504.631656][ T4421] vfs_get_tree+0x8f/0x380 07:34:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0xbbaee436bdab1934) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x100000001, 0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x20}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x2}) dup(r0) 07:34:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000", 0x23}], 0x1}, 0x0) 07:34:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000", 0x23}], 0x1}, 0x0) [ 504.631673][ T4421] do_mount+0x13b3/0x1c30 [ 504.631688][ T4421] ? copy_mount_string+0x40/0x40 [ 504.631705][ T4421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.631722][ T4421] ? copy_mount_options+0x2e8/0x3f0 [ 504.656846][ T4421] ksys_mount+0xdb/0x150 [ 504.661099][ T4421] __x64_sys_mount+0xbe/0x150 [ 504.665874][ T4421] do_syscall_64+0xfa/0x760 [ 504.670389][ T4421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.676386][ T4421] RIP: 0033:0x45c27a [ 504.681333][ T4421] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 504.701039][ T4421] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 504.709462][ T4421] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 504.709472][ T4421] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 504.709478][ T4421] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 504.709483][ T4421] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 504.709490][ T4421] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x2}, 0x28) 07:34:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x5, 0xfc, 0x8, 0xd244, 0x100}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @loopback}, 0xc) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b706000002ffffffad4605000000000064040000010000000404000001000000b7050000220080006a0a00fe00000000850000000a000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x1a, 0x6e, &(0x7f0000000140)="0416196421bb813bcafa8d24482ecaf552bc3b736d15bd6444a0", &(0x7f00000002c0)=""/110, 0x7}, 0x28) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000", 0x29}], 0x1}, 0x0) 07:34:58 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000", 0x29}], 0x1}, 0x0) 07:34:58 executing program 2: socketpair$unix(0x1, 0x805, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 07:34:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x2) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000", 0x29}], 0x1}, 0x0) [ 504.918264][ T4552] FAULT_INJECTION: forcing a failure. [ 504.918264][ T4552] name failslab, interval 1, probability 0, space 0, times 0 [ 504.969509][ T4552] CPU: 1 PID: 4552 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 504.978590][ T4552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.988642][ T4552] Call Trace: [ 504.991932][ T4552] dump_stack+0x172/0x1f0 [ 504.996284][ T4552] should_fail.cold+0xa/0x15 [ 505.000859][ T4552] ? fault_create_debugfs_attr+0x180/0x180 [ 505.006662][ T4552] ? page_to_nid.part.0+0x20/0x20 [ 505.011703][ T4552] ? ___might_sleep+0x163/0x280 [ 505.016538][ T4552] __should_failslab+0x121/0x190 [ 505.021461][ T4552] should_failslab+0x9/0x14 [ 505.025946][ T4552] kmem_cache_alloc_node_trace+0x274/0x750 [ 505.031747][ T4552] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 505.037538][ T4552] __kmalloc_node+0x3d/0x70 [ 505.042024][ T4552] kvmalloc_node+0x68/0x100 [ 505.046509][ T4552] __list_lru_init+0x4d5/0x710 [ 505.051255][ T4552] alloc_super+0x762/0x890 [ 505.055661][ T4552] ? test_bdev_super_fc+0x80/0x80 [ 505.060675][ T4552] sget+0x117/0x560 [ 505.064463][ T4552] ? set_bdev_super_fc+0x210/0x210 [ 505.069571][ T4552] mount_bdev+0xff/0x3c0 [ 505.073882][ T4552] ? isofs_bread+0xe0/0xe0 [ 505.078282][ T4552] isofs_mount+0x35/0x40 [ 505.082505][ T4552] ? isofs_readpage+0x30/0x30 [ 505.087182][ T4552] legacy_get_tree+0x113/0x220 [ 505.091928][ T4552] ? ns_capable_common+0x93/0x100 [ 505.096934][ T4552] vfs_get_tree+0x8f/0x380 [ 505.101338][ T4552] do_mount+0x13b3/0x1c30 [ 505.105651][ T4552] ? copy_mount_string+0x40/0x40 [ 505.110662][ T4552] ? copy_mount_options+0x241/0x3f0 [ 505.115855][ T4552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.122082][ T4552] ? copy_mount_options+0x2e8/0x3f0 [ 505.127280][ T4552] ksys_mount+0xdb/0x150 [ 505.131596][ T4552] __x64_sys_mount+0xbe/0x150 [ 505.136274][ T4552] do_syscall_64+0xfa/0x760 [ 505.140770][ T4552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.146729][ T4552] RIP: 0033:0x45c27a [ 505.150607][ T4552] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:34:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xf0}, 0x28) [ 505.170193][ T4552] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 505.178585][ T4552] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 505.186540][ T4552] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 505.194510][ T4552] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 505.202464][ T4552] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 505.210432][ T4552] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700", 0x2c}], 0x1}, 0x0) 07:34:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x37e0aa3af08980b4, r0, 0x0) r1 = userfaultfd(0x80004) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x26}, 0x4}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e21, 0x40, @rand_addr="042378d045bb4b3b323949d21e818687", 0x9}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}], 0x98) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='fd\x00') getdents64(r0, &(0x7f0000000100)=""/92, 0x5c) 07:34:58 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = dup3(r0, r1, 0x80000) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000000)=0x4) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x305000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700", 0x2c}], 0x1}, 0x0) 07:34:58 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x25) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 07:34:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700", 0x2c}], 0x1}, 0x0) 07:34:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x3f00}, 0x28) 07:34:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x400) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000040)=""/233) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:34:58 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x25) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 07:34:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0", 0x2d}], 0x1}, 0x0) [ 505.775414][ T4611] FAULT_INJECTION: forcing a failure. [ 505.775414][ T4611] name failslab, interval 1, probability 0, space 0, times 0 [ 505.791570][ T4611] CPU: 1 PID: 4611 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 505.800627][ T4611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.800632][ T4611] Call Trace: [ 505.800659][ T4611] dump_stack+0x172/0x1f0 [ 505.800680][ T4611] should_fail.cold+0xa/0x15 [ 505.800696][ T4611] ? fault_create_debugfs_attr+0x180/0x180 [ 505.800714][ T4611] ? page_to_nid.part.0+0x20/0x20 [ 505.800727][ T4611] ? ___might_sleep+0x163/0x280 [ 505.800743][ T4611] __should_failslab+0x121/0x190 [ 505.800758][ T4611] should_failslab+0x9/0x14 [ 505.800768][ T4611] kmem_cache_alloc_trace+0x2d3/0x790 [ 505.800780][ T4611] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 505.800794][ T4611] __memcg_init_list_lru_node+0x8a/0x1e0 [ 505.800807][ T4611] __list_lru_init+0x3fe/0x710 [ 505.800822][ T4611] alloc_super+0x762/0x890 [ 505.800842][ T4611] ? test_bdev_super_fc+0x80/0x80 [ 505.818529][ T4611] sget+0x117/0x560 [ 505.818549][ T4611] ? set_bdev_super_fc+0x210/0x210 [ 505.833011][ T4611] mount_bdev+0xff/0x3c0 [ 505.833025][ T4611] ? isofs_bread+0xe0/0xe0 [ 505.833038][ T4611] isofs_mount+0x35/0x40 [ 505.833049][ T4611] ? isofs_readpage+0x30/0x30 [ 505.833062][ T4611] legacy_get_tree+0x113/0x220 [ 505.833074][ T4611] ? ns_capable_common+0x93/0x100 [ 505.833091][ T4611] vfs_get_tree+0x8f/0x380 [ 505.925423][ T4611] do_mount+0x13b3/0x1c30 [ 505.929755][ T4611] ? copy_mount_string+0x40/0x40 [ 505.934697][ T4611] ? copy_mount_options+0x252/0x3f0 [ 505.939898][ T4611] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 505.945447][ T4611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.951684][ T4611] ? copy_mount_options+0x2e8/0x3f0 [ 505.956886][ T4611] ksys_mount+0xdb/0x150 [ 505.961147][ T4611] __x64_sys_mount+0xbe/0x150 [ 505.965831][ T4611] do_syscall_64+0xfa/0x760 [ 505.970365][ T4611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.976255][ T4611] RIP: 0033:0x45c27a [ 505.980151][ T4611] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 505.999761][ T4611] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 506.008196][ T4611] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 506.016166][ T4611] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 506.024142][ T4611] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 506.032217][ T4611] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 506.040212][ T4611] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:59 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000100)={r0, r0, 0x4f, 0x8a, &(0x7f0000000040)="fe7c1c03e49d6104cf834a23b2e0a0b87102b472b52c816a3b100d9f8afbd9fcc5e388a3ac63a9220034fcf18814bd86174f3bbae5e012718a026d6a8fb71c7c625c95a8642414193b1b22a64f6a4df6f5fc177d10423b816a50ac49b55c8ffc44a64809f90601642707dd7c661baec41e8e1e411a0c609df94ccb58adf130e62eabae213e120b024375", 0x40000000000, 0x1ff, 0x80, 0xafc, 0x8, 0x2, 0x9, 'syz1\x00'}) 07:34:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x4000}, 0x28) 07:34:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0", 0x2d}], 0x1}, 0x0) 07:34:59 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x25) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 07:34:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xce, 0x80) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x1, 0x20}) r2 = userfaultfd(0x80800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406480, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000005580)={0x0, @local, @local}, &(0x7f00000055c0)=0xc) sendmsg$can_raw(r1, &(0x7f0000005700)={&(0x7f0000005600)={0x1d, r4}, 0x10, &(0x7f00000056c0)={&(0x7f0000005640)=@canfd={{0x4, 0x3f, 0x3, 0x220}, 0x29, 0x1, 0x0, 0x0, "c0876c3502dca234620d3b9d75d13a0b18f64e33fde394c8d39e0976f76c673336d0f6a0fc35a05e2e7559eff19ac1612e23900ec0c398fb6fe9595ccdc4cb5d"}, 0x48}, 0x1, 0x0, 0x0, 0x48005}, 0x44004) 07:34:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000507eda7fc76f8e7137b3231d200100003402f00000000340080000000011400f88000f01700d0", 0x2d}], 0x1}, 0x0) 07:34:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xf000}, 0x28) [ 506.186536][ T4626] FAULT_INJECTION: forcing a failure. [ 506.186536][ T4626] name failslab, interval 1, probability 0, space 0, times 0 [ 506.302182][ T4626] CPU: 0 PID: 4626 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 506.311272][ T4626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.321341][ T4626] Call Trace: [ 506.324634][ T4626] dump_stack+0x172/0x1f0 [ 506.329007][ T4626] should_fail.cold+0xa/0x15 [ 506.333597][ T4626] ? fault_create_debugfs_attr+0x180/0x180 [ 506.339389][ T4626] ? page_to_nid.part.0+0x20/0x20 [ 506.344395][ T4626] ? ___might_sleep+0x163/0x280 [ 506.349234][ T4626] __should_failslab+0x121/0x190 [ 506.354154][ T4626] should_failslab+0x9/0x14 [ 506.358635][ T4626] kmem_cache_alloc_trace+0x2d3/0x790 [ 506.364017][ T4626] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 506.369809][ T4626] __memcg_init_list_lru_node+0x8a/0x1e0 [ 506.375421][ T4626] __list_lru_init+0x3fe/0x710 [ 506.380172][ T4626] alloc_super+0x762/0x890 [ 506.384569][ T4626] ? test_bdev_super_fc+0x80/0x80 [ 506.389575][ T4626] sget+0x117/0x560 [ 506.393365][ T4626] ? set_bdev_super_fc+0x210/0x210 [ 506.398460][ T4626] mount_bdev+0xff/0x3c0 [ 506.402689][ T4626] ? isofs_bread+0xe0/0xe0 [ 506.407091][ T4626] isofs_mount+0x35/0x40 [ 506.411315][ T4626] ? isofs_readpage+0x30/0x30 [ 506.415977][ T4626] legacy_get_tree+0x113/0x220 [ 506.420724][ T4626] ? ns_capable_common+0x93/0x100 [ 506.425748][ T4626] vfs_get_tree+0x8f/0x380 [ 506.430148][ T4626] do_mount+0x13b3/0x1c30 [ 506.434460][ T4626] ? copy_mount_string+0x40/0x40 [ 506.439385][ T4626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.445612][ T4626] ? copy_mount_options+0x2e8/0x3f0 [ 506.450795][ T4626] ksys_mount+0xdb/0x150 [ 506.455023][ T4626] __x64_sys_mount+0xbe/0x150 [ 506.459686][ T4626] do_syscall_64+0xfa/0x760 [ 506.464175][ T4626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.470050][ T4626] RIP: 0033:0x45c27a [ 506.473949][ T4626] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 506.493533][ T4626] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:34:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 07:34:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 506.501925][ T4626] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 506.509879][ T4626] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 506.517940][ T4626] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 506.525892][ T4626] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 506.533843][ T4626] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:34:59 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:34:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000400)) 07:34:59 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x25) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 07:34:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x8000a0}, 0x28) 07:34:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:34:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x204000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000040)={{0xa4, 0x5}, 'port1\x00', 0xb4, 0x1000, 0x8, 0xfff, 0x9, 0x17, 0x4, 0x0, 0x1, 0x5e01}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 506.650757][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:35:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 506.718339][ T4660] FAULT_INJECTION: forcing a failure. [ 506.718339][ T4660] name failslab, interval 1, probability 0, space 0, times 0 [ 506.740411][ T4660] CPU: 0 PID: 4660 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 506.749487][ T4660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.759557][ T4660] Call Trace: [ 506.759585][ T4660] dump_stack+0x172/0x1f0 [ 506.759601][ T4660] should_fail.cold+0xa/0x15 [ 506.759625][ T4660] ? fault_create_debugfs_attr+0x180/0x180 [ 506.771799][ T4660] ? page_to_nid.part.0+0x20/0x20 [ 506.771815][ T4660] ? ___might_sleep+0x163/0x280 [ 506.771830][ T4660] __should_failslab+0x121/0x190 [ 506.771848][ T4660] should_failslab+0x9/0x14 [ 506.782649][ T4660] kmem_cache_alloc_trace+0x2d3/0x790 [ 506.782664][ T4660] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 506.782680][ T4660] __memcg_init_list_lru_node+0x8a/0x1e0 [ 506.782696][ T4660] __list_lru_init+0x3fe/0x710 [ 506.818540][ T4660] alloc_super+0x762/0x890 [ 506.822957][ T4660] ? test_bdev_super_fc+0x80/0x80 [ 506.827987][ T4660] sget+0x117/0x560 [ 506.831796][ T4660] ? set_bdev_super_fc+0x210/0x210 [ 506.836910][ T4660] mount_bdev+0xff/0x3c0 [ 506.841153][ T4660] ? isofs_bread+0xe0/0xe0 [ 506.845569][ T4660] isofs_mount+0x35/0x40 [ 506.849840][ T4660] ? isofs_readpage+0x30/0x30 [ 506.854523][ T4660] legacy_get_tree+0x113/0x220 [ 506.859291][ T4660] ? ns_capable_common+0x93/0x100 [ 506.864314][ T4660] vfs_get_tree+0x8f/0x380 [ 506.868734][ T4660] do_mount+0x13b3/0x1c30 [ 506.873498][ T4660] ? copy_mount_string+0x40/0x40 [ 506.878438][ T4660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.884677][ T4660] ? copy_mount_options+0x2e8/0x3f0 [ 506.889883][ T4660] ksys_mount+0xdb/0x150 [ 506.894128][ T4660] __x64_sys_mount+0xbe/0x150 [ 506.898806][ T4660] do_syscall_64+0xfa/0x760 [ 506.903314][ T4660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.909205][ T4660] RIP: 0033:0x45c27a [ 506.913103][ T4660] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 506.932797][ T4660] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 506.941296][ T4660] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 506.949260][ T4660] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 506.957216][ T4660] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 07:35:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x9) socketpair$unix(0x1, 0x8000100000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read(r0, &(0x7f0000000100)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) ioctl$TIOCGETD(r0, 0x5424, 0x0) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000380)) [ 506.965174][ T4660] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 506.973230][ T4660] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) fgetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f73322ec0196465ca07f86574683000"], &(0x7f0000000040)=""/122, 0x7a) 07:35:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') close(r0) 07:35:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xf0ffff}, 0x28) 07:35:00 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000012000/0x1000)=nil, 0x1000, 0x0, 0x400000000011, r0, 0x200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x3}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000040)={0x80000001, 0x452}) 07:35:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:00 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000540)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 507.216494][ T4779] FAULT_INJECTION: forcing a failure. [ 507.216494][ T4779] name failslab, interval 1, probability 0, space 0, times 0 [ 507.259370][ T4779] CPU: 1 PID: 4779 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 507.268440][ T4779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.268446][ T4779] Call Trace: [ 507.268473][ T4779] dump_stack+0x172/0x1f0 [ 507.268499][ T4779] should_fail.cold+0xa/0x15 [ 507.290876][ T4779] ? fault_create_debugfs_attr+0x180/0x180 [ 507.296717][ T4779] ? page_to_nid.part.0+0x20/0x20 [ 507.296738][ T4779] ? ___might_sleep+0x163/0x280 07:35:00 executing program 2: creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 507.302009][ T4787] binder: 4786:4787 ioctl c0306201 0 returned -14 [ 507.306644][ T4779] __should_failslab+0x121/0x190 [ 507.306660][ T4779] should_failslab+0x9/0x14 [ 507.306678][ T4779] kmem_cache_alloc_trace+0x2d3/0x790 [ 507.318100][ T4779] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 507.318119][ T4779] __memcg_init_list_lru_node+0x8a/0x1e0 [ 507.334207][ T4779] __list_lru_init+0x3fe/0x710 [ 507.334226][ T4779] alloc_super+0x762/0x890 [ 507.334239][ T4779] ? test_bdev_super_fc+0x80/0x80 [ 507.334250][ T4779] sget+0x117/0x560 [ 507.334267][ T4779] ? set_bdev_super_fc+0x210/0x210 [ 507.357972][ T4779] mount_bdev+0xff/0x3c0 [ 507.357992][ T4779] ? isofs_bread+0xe0/0xe0 [ 507.371751][ T4779] isofs_mount+0x35/0x40 [ 507.371769][ T4779] ? isofs_readpage+0x30/0x30 [ 507.380753][ T4779] legacy_get_tree+0x113/0x220 [ 507.385542][ T4779] ? ns_capable_common+0x93/0x100 [ 507.387963][ T4790] fuse: Bad value for 'subtype' [ 507.390580][ T4779] vfs_get_tree+0x8f/0x380 [ 507.390597][ T4779] do_mount+0x13b3/0x1c30 [ 507.390614][ T4779] ? copy_mount_string+0x40/0x40 07:35:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$binfmt_aout(r1, &(0x7f0000000340)={{0x0, 0x200, 0x1, 0x218, 0x42, 0x6b15, 0x1e7, 0x1f}, "477785d415e9639db9eab64825a383eef2419649faed8e3cb447ab6d06aaf0b674a2ef4eab67bf099942ba7d00ebdcc3fe21b340735b550313cb9b5b748f7e5c4a69fa309b5711e7cde81bec4e0de867797bf65153fe7d07ab1f1b6c1c52dcf67a0d4096b421e8f9251eede690e63211322f620e1bf944f0360d5aed25c5950c3b262a233fb24b691f4fad0bf250fd8cd19d07b01f44113f6dfa6384421522cc26b2acb514f5ed060f6c3fbd2b48ad833938f8b5324e92d3d65085c851421a01d53f53f9a00cad84f7b748c24ba2030b6fbfb960e5a51f07a6a9956a29f3927c24303c37b11fc044701372627370872c23", [[], [], [], [], [], [], [], [], [], []]}, 0xb11) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x5, 0x69ef89d5, 0x4, 0x0, 0x0, [{r0, 0x0, 0x6}, {r0, 0x0, 0x80000000}, {r1}, {r0, 0x0, 0x378}]}) 07:35:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x1000000}, 0x28) [ 507.390631][ T4779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.390643][ T4779] ? copy_mount_options+0x2e8/0x3f0 [ 507.390655][ T4779] ksys_mount+0xdb/0x150 [ 507.390667][ T4779] __x64_sys_mount+0xbe/0x150 [ 507.390684][ T4779] do_syscall_64+0xfa/0x760 [ 507.390701][ T4779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.390711][ T4779] RIP: 0033:0x45c27a [ 507.390723][ T4779] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 507.390729][ T4779] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 507.390742][ T4779] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 507.390748][ T4779] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 507.390756][ T4779] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 507.390762][ T4779] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:35:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x2000000}, 0x28) [ 507.390769][ T4779] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 507.474078][ T4797] fuse: Bad value for 'subtype' 07:35:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc) 07:35:00 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 507.598206][ T4794] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 507.598206][ T4794] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 507.598206][ T4794] 07:35:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x200080000) r2 = accept$inet(r0, &(0x7f0000000500)={0x2, 0x0, @multicast2}, &(0x7f0000000540)=0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'nlmon0\x00', 0x0}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0xbe, @dev={0xac, 0x14, 0x14, 0xc}, 0x4e20, 0x4, 'ovf\x00', 0x14, 0x800, 0x50}, 0x2c) bind$packet(r3, &(0x7f0000000080)={0x11, 0xf, r4, 0x1, 0x0, 0x6, @dev={[], 0x1b}}, 0x14) getsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000580)=""/164, &(0x7f0000000640)=0xa4) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x3f000000}, 0x28) [ 507.669633][ T4794] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 507.697424][ T4810] IPVS: set_ctl: invalid protocol: 190 172.20.20.12:20000 [ 507.708287][ T4811] IPVS: set_ctl: invalid protocol: 190 172.20.20.12:20000 [ 507.775343][ T4824] FAULT_INJECTION: forcing a failure. [ 507.775343][ T4824] name failslab, interval 1, probability 0, space 0, times 0 [ 507.789330][ T4824] CPU: 1 PID: 4824 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 507.798383][ T4824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.798390][ T4824] Call Trace: [ 507.798429][ T4824] dump_stack+0x172/0x1f0 [ 507.811806][ T4824] should_fail.cold+0xa/0x15 [ 507.821223][ T4824] ? fault_create_debugfs_attr+0x180/0x180 [ 507.821241][ T4824] ? page_to_nid.part.0+0x20/0x20 [ 507.821256][ T4824] ? ___might_sleep+0x163/0x280 [ 507.821273][ T4824] __should_failslab+0x121/0x190 [ 507.821287][ T4824] should_failslab+0x9/0x14 [ 507.821304][ T4824] kmem_cache_alloc_trace+0x2d3/0x790 [ 507.832199][ T4824] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 507.832217][ T4824] __memcg_init_list_lru_node+0x8a/0x1e0 [ 507.832229][ T4824] __list_lru_init+0x3fe/0x710 [ 507.832248][ T4824] alloc_super+0x762/0x890 [ 507.832261][ T4824] ? test_bdev_super_fc+0x80/0x80 [ 507.832274][ T4824] sget+0x117/0x560 [ 507.832291][ T4824] ? set_bdev_super_fc+0x210/0x210 [ 507.868116][ T4824] mount_bdev+0xff/0x3c0 [ 507.868136][ T4824] ? isofs_bread+0xe0/0xe0 [ 507.877561][ T4824] isofs_mount+0x35/0x40 [ 507.877579][ T4824] ? isofs_readpage+0x30/0x30 [ 507.905672][ T4824] legacy_get_tree+0x113/0x220 [ 507.910439][ T4824] ? ns_capable_common+0x93/0x100 [ 507.915474][ T4824] vfs_get_tree+0x8f/0x380 [ 507.919900][ T4824] do_mount+0x13b3/0x1c30 [ 507.924259][ T4824] ? copy_mount_string+0x40/0x40 [ 507.929201][ T4824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.935464][ T4824] ? copy_mount_options+0x2e8/0x3f0 [ 507.940708][ T4824] ksys_mount+0xdb/0x150 [ 507.944970][ T4824] __x64_sys_mount+0xbe/0x150 [ 507.949924][ T4824] do_syscall_64+0xfa/0x760 [ 507.954448][ T4824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.960433][ T4824] RIP: 0033:0x45c27a 07:35:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) [ 507.964344][ T4824] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 507.984238][ T4824] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 507.992752][ T4824] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 508.000907][ T4824] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 508.008893][ T4824] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 508.017009][ T4824] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:35:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'nlmon0\x00', {0x2, 0x4e21, @empty}}) 07:35:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 508.025097][ T4824] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x40000000}, 0x28) 07:35:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:01 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x309140) r1 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x5, 0x6, 0x800, 0x6e6, 'syz0\x00', 0x8}, 0x51d42c86, 0x8, 0xa8e, r1, 0x5, 0x3, 'syz0\x00', &(0x7f0000000040)=['ppp0\x00', '{-^}$vboxnet1lo}\x00', 'security.,selinux*eth1{)]vmnet1\x00', '\x00', '*posix_acl_access\x00'], 0x49, [], [0x2, 0x2, 0x200]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r2, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 508.147300][ T4927] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 508.147300][ T4927] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 508.147300][ T4927] [ 508.179304][ T4927] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:01 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xa0008000}, 0x28) 07:35:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x16002, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x881) 07:35:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b", 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xfeffffff}, 0x28) 07:35:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 508.385678][ T4941] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 508.385678][ T4941] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 508.385678][ T4941] [ 508.418623][ T4951] FAULT_INJECTION: forcing a failure. [ 508.418623][ T4951] name failslab, interval 1, probability 0, space 0, times 0 [ 508.418643][ T4951] CPU: 0 PID: 4951 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 508.432090][ T4941] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 508.440906][ T4951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.440913][ T4951] Call Trace: [ 508.440955][ T4951] dump_stack+0x172/0x1f0 [ 508.440973][ T4951] should_fail.cold+0xa/0x15 [ 508.440987][ T4951] ? fault_create_debugfs_attr+0x180/0x180 [ 508.441003][ T4951] ? page_to_nid.part.0+0x20/0x20 [ 508.441029][ T4951] ? ___might_sleep+0x163/0x280 [ 508.459685][ T4951] __should_failslab+0x121/0x190 [ 508.459705][ T4951] should_failslab+0x9/0x14 [ 508.496936][ T4951] kmem_cache_alloc_trace+0x2d3/0x790 [ 508.502313][ T4951] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 508.508125][ T4951] __memcg_init_list_lru_node+0x8a/0x1e0 [ 508.513764][ T4951] __list_lru_init+0x3fe/0x710 [ 508.518622][ T4951] alloc_super+0x762/0x890 [ 508.523049][ T4951] ? test_bdev_super_fc+0x80/0x80 [ 508.528071][ T4951] sget+0x117/0x560 [ 508.531889][ T4951] ? set_bdev_super_fc+0x210/0x210 [ 508.537015][ T4951] mount_bdev+0xff/0x3c0 [ 508.541258][ T4951] ? isofs_bread+0xe0/0xe0 [ 508.545679][ T4951] isofs_mount+0x35/0x40 [ 508.549924][ T4951] ? isofs_readpage+0x30/0x30 [ 508.554601][ T4951] legacy_get_tree+0x113/0x220 [ 508.559369][ T4951] ? ns_capable_common+0x93/0x100 [ 508.564397][ T4951] vfs_get_tree+0x8f/0x380 [ 508.568821][ T4951] do_mount+0x13b3/0x1c30 [ 508.573160][ T4951] ? copy_mount_string+0x40/0x40 [ 508.578110][ T4951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.584359][ T4951] ? copy_mount_options+0x2e8/0x3f0 [ 508.589566][ T4951] ksys_mount+0xdb/0x150 [ 508.593813][ T4951] __x64_sys_mount+0xbe/0x150 [ 508.598497][ T4951] do_syscall_64+0xfa/0x760 [ 508.603012][ T4951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.608903][ T4951] RIP: 0033:0x45c27a [ 508.612814][ T4951] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b", 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 508.632501][ T4951] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 508.640914][ T4951] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 508.648897][ T4951] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 508.656869][ T4951] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 508.664843][ T4951] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 508.672815][ T4951] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xfffff000}, 0x28) 07:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b", 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:02 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="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", 0x1000, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='+(.eth1trusted+^em1\x00', 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, r3) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = dup3(r1, r1, 0x80000) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000013c0)) r6 = getgid() write$FUSE_ATTR(r4, &(0x7f0000001340)={0x78, 0xffffffffffffffff, 0x1, {0x2, 0x9, 0x0, {0x6, 0x3f, 0x9, 0xb209, 0x7fff, 0x5, 0x6, 0x5, 0x2, 0x45f, 0x10000, r5, r6, 0x100000001, 0x8}}}, 0x78) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f0000000280)={0x8001, 0x81c, 0x8, 0x1, 0x6, 0x6a3a}) 07:35:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7a", 0x7) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xfffffffe}, 0x28) 07:35:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socket$rxrpc(0x21, 0x2, 0xa) 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 508.913675][ T4973] FAULT_INJECTION: forcing a failure. [ 508.913675][ T4973] name failslab, interval 1, probability 0, space 0, times 0 [ 508.925344][ T4969] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 508.925344][ T4969] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 508.925344][ T4969] [ 508.983560][ T4969] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 508.984712][ T4973] CPU: 0 PID: 4973 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 509.001244][ T4973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.011309][ T4973] Call Trace: [ 509.014617][ T4973] dump_stack+0x172/0x1f0 [ 509.018977][ T4973] should_fail.cold+0xa/0x15 [ 509.023585][ T4973] ? fault_create_debugfs_attr+0x180/0x180 [ 509.029407][ T4973] ? page_to_nid.part.0+0x20/0x20 [ 509.034446][ T4973] ? ___might_sleep+0x163/0x280 [ 509.039307][ T4973] __should_failslab+0x121/0x190 [ 509.044257][ T4973] should_failslab+0x9/0x14 [ 509.048778][ T4973] kmem_cache_alloc_trace+0x2d3/0x790 [ 509.054246][ T4973] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 509.060073][ T4973] __memcg_init_list_lru_node+0x8a/0x1e0 [ 509.065811][ T4973] __list_lru_init+0x3fe/0x710 [ 509.070582][ T4973] alloc_super+0x762/0x890 [ 509.075004][ T4973] ? test_bdev_super_fc+0x80/0x80 [ 509.080032][ T4973] sget+0x117/0x560 [ 509.083847][ T4973] ? set_bdev_super_fc+0x210/0x210 [ 509.088966][ T4973] mount_bdev+0xff/0x3c0 [ 509.093206][ T4973] ? isofs_bread+0xe0/0xe0 [ 509.097651][ T4973] isofs_mount+0x35/0x40 [ 509.101895][ T4973] ? isofs_readpage+0x30/0x30 [ 509.106575][ T4973] legacy_get_tree+0x113/0x220 [ 509.111344][ T4973] ? ns_capable_common+0x93/0x100 [ 509.116381][ T4973] vfs_get_tree+0x8f/0x380 [ 509.120817][ T4973] do_mount+0x13b3/0x1c30 [ 509.125156][ T4973] ? copy_mount_string+0x40/0x40 [ 509.130107][ T4973] ? copy_mount_options+0x263/0x3f0 [ 509.135311][ T4973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.141559][ T4973] ? copy_mount_options+0x2e8/0x3f0 [ 509.146763][ T4973] ksys_mount+0xdb/0x150 [ 509.151013][ T4973] __x64_sys_mount+0xbe/0x150 [ 509.155697][ T4973] do_syscall_64+0xfa/0x760 [ 509.160214][ T4973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.166108][ T4973] RIP: 0033:0x45c27a [ 509.170001][ T4973] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 509.189696][ T4973] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 509.198107][ T4973] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 509.206082][ T4973] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 509.214052][ T4973] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 509.222116][ T4973] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7a", 0x7) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x101000, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x678, 0x468, 0x260, 0x110, 0x260, 0x0, 0x5a8, 0x5a8, 0x5a8, 0x5a8, 0x5a8, 0x6, &(0x7f0000000340), {[{{@uncond, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x17, 0x27, 0x1}}}, {{@ipv6={@empty, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}, [0xff0000ff, 0x0, 0xff000000, 0xff0000ff], [0xffffffff, 0xffffffff], 'veth1\x00', '\x00', {}, {0xff}, 0x86, 0x4, 0x3}, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@remote, [0xffffff00, 0xffffff00, 0xffffffff, 0xffffffff], 0x4e20, 0x4e23, 0x4e21, 0x4e23, 0x69, 0xffffffffffff0000, 0x4, 0x503, 0x1000}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [0xffffffff, 0xffffffff, 0xffffffff, 0xff000000], [0x0, 0xffffff00, 0xffffffff, 0xffffffff], 'syz_tun\x00', 'bcsf0\x00', {}, {}, 0xff, 0xfffffffffffffc00, 0x1, 0x2}, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x100}}}, {{@ipv6={@mcast1, @rand_addr="01b7fb0c365786c65eeb9fff380e9f10", [0xffffff00, 0x0, 0x0, 0xffffff00], [0xffffffff, 0xff0000ff, 0xffffffff, 0xff000000], 'caif0\x00', 'nr0\x00', {0xff}, {0xff}, 0x0, 0x7fff, 0x1, 0x2}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0x31}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x100000001}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d8) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r3 = add_key$user(&(0x7f0000000ac0)='user\x00', &(0x7f0000000b00)={'syz', 0x0}, &(0x7f0000000b40)="3f4cdf5d5b2cdcfce23ccf08265bdf5e008bce44ab28de5ec092cc51cdbe08d09693b14f9e5706f14b8b341caae2b4dfef794f59fafd9140a8086f3d6c6ca13f1c71c78593d8eff1beeb7a347f347ab6454146f892c0f29a496eb2424962612fe1ba32692aa48c9b0c54c7c2c489091de742973a53ad1df678ca05133218f471cf0ffe5feed47d5afad63a90a1c1d3ed5bdd5e3535663a3058a12fb8527be2b310ffd396de565f1f827af6b848c39040af41c156dbf368e9ae6f0ea5e39d0231d1", 0xc1, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r3, 0xa8c) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x9, @local, 0x3}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r5, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x6, 0x433}, &(0x7f0000000200)=0x90) write$FUSE_WRITE(r4, &(0x7f0000000280)={0x18, 0x0, 0x1, {0x3}}, 0x18) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x8000a0ffffffff}, 0x28) [ 509.230084][ T4973] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:02 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7a", 0x7) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xf0ffffffffffff}, 0x28) 07:35:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xd0000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) 07:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 509.419933][ T4999] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 509.419933][ T4999] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 509.419933][ T4999] 07:35:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) userfaultfd(0x80800) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x100000000000000}, 0x28) [ 509.501901][ T4999] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 509.642127][ T5019] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 509.642127][ T5019] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 509.642127][ T5019] [ 509.665377][ T5023] FAULT_INJECTION: forcing a failure. [ 509.665377][ T5023] name failslab, interval 1, probability 0, space 0, times 0 [ 509.668353][ T5019] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 509.690764][ T5023] CPU: 0 PID: 5023 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 509.699824][ T5023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.709874][ T5023] Call Trace: [ 509.713198][ T5023] dump_stack+0x172/0x1f0 [ 509.717638][ T5023] should_fail.cold+0xa/0x15 [ 509.722326][ T5023] ? fault_create_debugfs_attr+0x180/0x180 [ 509.728147][ T5023] ? page_to_nid.part.0+0x20/0x20 [ 509.733177][ T5023] ? ___might_sleep+0x163/0x280 [ 509.739581][ T5023] __should_failslab+0x121/0x190 [ 509.744527][ T5023] should_failslab+0x9/0x14 [ 509.749047][ T5023] kmem_cache_alloc_trace+0x2d3/0x790 [ 509.754432][ T5023] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 509.760241][ T5023] __memcg_init_list_lru_node+0x8a/0x1e0 [ 509.765881][ T5023] __list_lru_init+0x3fe/0x710 [ 509.770649][ T5023] alloc_super+0x762/0x890 [ 509.775065][ T5023] ? test_bdev_super_fc+0x80/0x80 [ 509.780089][ T5023] sget+0x117/0x560 [ 509.783906][ T5023] ? set_bdev_super_fc+0x210/0x210 [ 509.789019][ T5023] mount_bdev+0xff/0x3c0 [ 509.793258][ T5023] ? isofs_bread+0xe0/0xe0 [ 509.797673][ T5023] isofs_mount+0x35/0x40 [ 509.801918][ T5023] ? isofs_readpage+0x30/0x30 [ 509.806596][ T5023] legacy_get_tree+0x113/0x220 [ 509.811367][ T5023] ? ns_capable_common+0x93/0x100 [ 509.816391][ T5023] vfs_get_tree+0x8f/0x380 [ 509.820812][ T5023] do_mount+0x13b3/0x1c30 [ 509.825143][ T5023] ? copy_mount_string+0x40/0x40 [ 509.830088][ T5023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.836327][ T5023] ? copy_mount_options+0x2e8/0x3f0 [ 509.841533][ T5023] ksys_mount+0xdb/0x150 [ 509.845777][ T5023] __x64_sys_mount+0xbe/0x150 [ 509.850458][ T5023] do_syscall_64+0xfa/0x760 [ 509.854969][ T5023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.860855][ T5023] RIP: 0033:0x45c27a [ 509.864749][ T5023] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 509.884351][ T5023] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 509.892771][ T5023] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 509.900829][ T5023] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 509.909639][ T5023] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 509.917608][ T5023] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 509.925591][ T5023] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:03 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) rt_sigpending(&(0x7f0000000000), 0x8) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x200000000000000}, 0x28) 07:35:03 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 510.089378][ T5032] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 510.089378][ T5032] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 510.089378][ T5032] [ 510.116357][ T5038] FAULT_INJECTION: forcing a failure. [ 510.116357][ T5038] name failslab, interval 1, probability 0, space 0, times 0 [ 510.139444][ T5038] CPU: 1 PID: 5038 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 510.148691][ T5038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.151951][ T5032] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 510.158755][ T5038] Call Trace: [ 510.158786][ T5038] dump_stack+0x172/0x1f0 [ 510.158813][ T5038] should_fail.cold+0xa/0x15 [ 510.179567][ T5038] ? fault_create_debugfs_attr+0x180/0x180 07:35:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:03 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x3f00000000000000}, 0x28) [ 510.185395][ T5038] ? page_to_nid.part.0+0x20/0x20 [ 510.190436][ T5038] ? ___might_sleep+0x163/0x280 [ 510.195318][ T5038] __should_failslab+0x121/0x190 [ 510.200261][ T5038] should_failslab+0x9/0x14 [ 510.204795][ T5038] kmem_cache_alloc_trace+0x2d3/0x790 [ 510.210171][ T5038] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 510.215978][ T5038] __memcg_init_list_lru_node+0x8a/0x1e0 [ 510.221618][ T5038] __list_lru_init+0x3fe/0x710 [ 510.226400][ T5038] alloc_super+0x762/0x890 [ 510.230838][ T5038] ? test_bdev_super_fc+0x80/0x80 [ 510.235940][ T5038] sget+0x117/0x560 [ 510.239754][ T5038] ? set_bdev_super_fc+0x210/0x210 [ 510.244869][ T5038] mount_bdev+0xff/0x3c0 [ 510.249117][ T5038] ? isofs_bread+0xe0/0xe0 [ 510.253545][ T5038] isofs_mount+0x35/0x40 [ 510.257790][ T5038] ? isofs_readpage+0x30/0x30 [ 510.262473][ T5038] legacy_get_tree+0x113/0x220 [ 510.267244][ T5038] ? ns_capable_common+0x93/0x100 [ 510.272369][ T5038] vfs_get_tree+0x8f/0x380 [ 510.276788][ T5038] do_mount+0x13b3/0x1c30 [ 510.281135][ T5038] ? copy_mount_string+0x40/0x40 [ 510.286083][ T5038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.292336][ T5038] ? copy_mount_options+0x2e8/0x3f0 [ 510.297539][ T5038] ksys_mount+0xdb/0x150 [ 510.301788][ T5038] __x64_sys_mount+0xbe/0x150 [ 510.306475][ T5038] do_syscall_64+0xfa/0x760 [ 510.310980][ T5038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.316869][ T5038] RIP: 0033:0x45c27a [ 510.320763][ T5038] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 510.340588][ T5038] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 510.349001][ T5038] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 510.356973][ T5038] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 510.364943][ T5038] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 510.372913][ T5038] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 510.380884][ T5038] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:03 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:03 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r1 = userfaultfd(0x5) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4001, 0x0) r3 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000200)={0x4, r3, 0x1}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000480)={0x3, @null, r4}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8001, 0x3, 0xff, 0x5, 0x10001, 0x6}, &(0x7f0000000040)=0x20) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000500)={{0x80000000, 0x2}, {0x4, 0x200}, 0x80000001, 0x5, 0x4}) r5 = dup3(r1, r0, 0x80000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000001c0)={r2, 0x20, 0x41, r5}) 07:35:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0x4000000000000000}, 0x28) [ 510.559690][ T5054] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 510.559690][ T5054] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 510.559690][ T5054] [ 510.594581][ T5059] FAULT_INJECTION: forcing a failure. [ 510.594581][ T5059] name failslab, interval 1, probability 0, space 0, times 0 [ 510.621734][ T5059] CPU: 1 PID: 5059 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 510.630817][ T5059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.640882][ T5059] Call Trace: [ 510.644178][ T5059] dump_stack+0x172/0x1f0 [ 510.648551][ T5059] should_fail.cold+0xa/0x15 [ 510.653127][ T5059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.659351][ T5059] ? fault_create_debugfs_attr+0x180/0x180 [ 510.665143][ T5059] ? page_to_nid.part.0+0x20/0x20 [ 510.670149][ T5059] ? ___might_sleep+0x163/0x280 [ 510.675016][ T5059] __should_failslab+0x121/0x190 [ 510.679949][ T5059] should_failslab+0x9/0x14 [ 510.684445][ T5059] kmem_cache_alloc_node_trace+0x274/0x750 [ 510.690232][ T5059] ? kasan_kmalloc+0x9/0x10 [ 510.694718][ T5059] ? kmem_cache_alloc_trace+0x346/0x790 [ 510.700245][ T5059] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 510.706034][ T5059] __kmalloc_node+0x3d/0x70 [ 510.710524][ T5059] kvmalloc_node+0x68/0x100 [ 510.715017][ T5059] __list_lru_init+0x4d5/0x710 [ 510.719764][ T5059] alloc_super+0x762/0x890 [ 510.724166][ T5059] ? test_bdev_super_fc+0x80/0x80 [ 510.729191][ T5059] sget+0x117/0x560 [ 510.732982][ T5059] ? set_bdev_super_fc+0x210/0x210 [ 510.738164][ T5059] mount_bdev+0xff/0x3c0 [ 510.742387][ T5059] ? isofs_bread+0xe0/0xe0 [ 510.746787][ T5059] isofs_mount+0x35/0x40 [ 510.751011][ T5059] ? isofs_readpage+0x30/0x30 [ 510.755672][ T5059] legacy_get_tree+0x113/0x220 [ 510.760418][ T5059] ? ns_capable_common+0x93/0x100 [ 510.765600][ T5059] vfs_get_tree+0x8f/0x380 [ 510.769998][ T5059] do_mount+0x13b3/0x1c30 [ 510.774328][ T5059] ? copy_mount_string+0x40/0x40 [ 510.779279][ T5059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.785503][ T5059] ? copy_mount_options+0x2e8/0x3f0 [ 510.790685][ T5059] ksys_mount+0xdb/0x150 [ 510.795269][ T5059] __x64_sys_mount+0xbe/0x150 [ 510.799937][ T5059] do_syscall_64+0xfa/0x760 [ 510.804446][ T5059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.810321][ T5059] RIP: 0033:0x45c27a [ 510.814212][ T5059] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 510.833874][ T5059] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 510.842352][ T5059] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 510.850305][ T5059] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 510.858269][ T5059] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 07:35:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) [ 510.866405][ T5059] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 510.874363][ T5059] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 510.893380][ T5054] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x40}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xfeffffff00000000}, 0x28) 07:35:04 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0x2f083}], 0x1}, 0x0) 07:35:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x1000008, 0x122033, r0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xffffffffa0008000}, 0x28) [ 511.097713][ T5080] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 511.097713][ T5080] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 511.097713][ T5080] [ 511.153646][ T5080] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:04 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) 07:35:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x20010, r0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000000)) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x0, 0xfffffffffffff000}, 0x28) 07:35:04 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x70) 07:35:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) 07:35:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x200000000000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 511.332658][ T5097] FAULT_INJECTION: forcing a failure. [ 511.332658][ T5097] name failslab, interval 1, probability 0, space 0, times 0 [ 511.383531][ T5100] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 511.383531][ T5100] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 511.383531][ T5100] [ 511.411671][ T5097] CPU: 0 PID: 5097 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 511.420747][ T5097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.420754][ T5097] Call Trace: [ 511.420787][ T5097] dump_stack+0x172/0x1f0 [ 511.420808][ T5097] should_fail.cold+0xa/0x15 [ 511.420824][ T5097] ? fault_create_debugfs_attr+0x180/0x180 [ 511.420840][ T5097] ? page_to_nid.part.0+0x20/0x20 [ 511.420854][ T5097] ? ___might_sleep+0x163/0x280 [ 511.420876][ T5097] __should_failslab+0x121/0x190 [ 511.449235][ T5097] should_failslab+0x9/0x14 [ 511.449250][ T5097] kmem_cache_alloc_trace+0x2d3/0x790 [ 511.449269][ T5097] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 511.459142][ T5097] __memcg_init_list_lru_node+0x8a/0x1e0 [ 511.459159][ T5097] __list_lru_init+0x3fe/0x710 [ 511.464704][ T5100] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 511.468774][ T5097] alloc_super+0x762/0x890 [ 511.468794][ T5097] ? test_bdev_super_fc+0x80/0x80 [ 511.479958][ T5097] sget+0x117/0x560 [ 511.479971][ T5097] ? set_bdev_super_fc+0x210/0x210 [ 511.479985][ T5097] mount_bdev+0xff/0x3c0 [ 511.479999][ T5097] ? isofs_bread+0xe0/0xe0 [ 511.480015][ T5097] isofs_mount+0x35/0x40 [ 511.530563][ T5097] ? isofs_readpage+0x30/0x30 [ 511.535252][ T5097] legacy_get_tree+0x113/0x220 [ 511.540112][ T5097] ? ns_capable_common+0x93/0x100 [ 511.545154][ T5097] vfs_get_tree+0x8f/0x380 [ 511.549572][ T5097] do_mount+0x13b3/0x1c30 [ 511.553909][ T5097] ? copy_mount_string+0x40/0x40 [ 511.558866][ T5097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.565210][ T5097] ? copy_mount_options+0x2e8/0x3f0 [ 511.570416][ T5097] ksys_mount+0xdb/0x150 [ 511.574666][ T5097] __x64_sys_mount+0xbe/0x150 [ 511.579353][ T5097] do_syscall_64+0xfa/0x760 [ 511.583875][ T5097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.589768][ T5097] RIP: 0033:0x45c27a [ 511.593666][ T5097] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 511.613568][ T5097] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 511.621993][ T5097] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:35:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) 07:35:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 511.629968][ T5097] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 511.637963][ T5097] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 511.646549][ T5097] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 511.654607][ T5097] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:05 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:05 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r1, 0x0) r2 = userfaultfd(0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f00000000c0)={0x2, 0x40, &(0x7f0000000040)="59b01957959281fed53b63e2c1491c35dcd8065b0211e302c2965ed1c3330421ffe0c68922682c58dbe08d2f36dd8a032f8290f791933fe9cf3fee2f2e716deef0cfcb82531764c7b7598c53cdda43af37f16fcfb7a6dc5ee95ae37f1822d451f8cdf84b5d17556890018a0029", {0x4, 0x4, 0x7f777f7f, 0x0, 0x7f, 0x1, 0xd, 0xffffffff}}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000002c0)) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000280)={0x73622a85, 0x110b}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000340)={0x1, 0x0, {0x8, 0x7f02b2c2, 0x3006, 0x4, 0x1, 0x1, 0x0, 0x7}}) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000100)={0xffffffffffffffd5, {{0xa, 0x4e24, 0x3, @mcast1, 0x2}}, {{0xa, 0x4e23, 0x1, @loopback, 0x9}}}, 0x108) 07:35:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x20000468) 07:35:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, 0x0}, 0x0) 07:35:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, 0x0}, 0x0) [ 511.841705][ T5118] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 511.841705][ T5118] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 511.841705][ T5118] 07:35:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="65124c00000000006113500000000000bf2000000000000007000000080000003d030100006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f901ae43010000000000950000000000000005000000000000009500000000000000135b858fe80519486166294f277109a7ff49c3ac3895df9441b72d113187"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xfffffffffffffeba, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x3}, 0x28) 07:35:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0xa, &(0x7f0000000040)=[{}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000100)={r3, 0x10}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) [ 511.885255][ T5128] FAULT_INJECTION: forcing a failure. [ 511.885255][ T5128] name failslab, interval 1, probability 0, space 0, times 0 [ 511.944649][ T5128] CPU: 1 PID: 5128 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 511.952699][ T5118] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 511.953730][ T5128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.953737][ T5128] Call Trace: [ 511.953769][ T5128] dump_stack+0x172/0x1f0 [ 511.980107][ T5128] should_fail.cold+0xa/0x15 [ 511.984722][ T5128] ? fault_create_debugfs_attr+0x180/0x180 [ 511.990547][ T5128] ? page_to_nid.part.0+0x20/0x20 [ 511.995585][ T5128] ? ___might_sleep+0x163/0x280 [ 512.000449][ T5128] __should_failslab+0x121/0x190 [ 512.005399][ T5128] should_failslab+0x9/0x14 [ 512.009922][ T5128] kmem_cache_alloc_trace+0x2d3/0x790 [ 512.015295][ T5128] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 512.021108][ T5128] __memcg_init_list_lru_node+0x8a/0x1e0 [ 512.026748][ T5128] __list_lru_init+0x3fe/0x710 [ 512.031520][ T5128] alloc_super+0x762/0x890 [ 512.035938][ T5128] ? test_bdev_super_fc+0x80/0x80 [ 512.040995][ T5128] sget+0x117/0x560 [ 512.044812][ T5128] ? set_bdev_super_fc+0x210/0x210 [ 512.049925][ T5128] mount_bdev+0xff/0x3c0 [ 512.054166][ T5128] ? isofs_bread+0xe0/0xe0 [ 512.058675][ T5128] isofs_mount+0x35/0x40 [ 512.063096][ T5128] ? isofs_readpage+0x30/0x30 [ 512.067878][ T5128] legacy_get_tree+0x113/0x220 [ 512.072650][ T5128] ? ns_capable_common+0x93/0x100 [ 512.077704][ T5128] vfs_get_tree+0x8f/0x380 [ 512.082129][ T5128] do_mount+0x13b3/0x1c30 [ 512.086472][ T5128] ? copy_mount_string+0x40/0x40 07:35:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000100)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000140)) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000040)=0x8) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/88) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socket$inet_udplite(0x2, 0x2, 0x88) 07:35:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, 0x0}, 0x0) [ 512.091417][ T5128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.097744][ T5128] ? copy_mount_options+0x2e8/0x3f0 [ 512.102988][ T5128] ksys_mount+0xdb/0x150 [ 512.107232][ T5128] __x64_sys_mount+0xbe/0x150 [ 512.111917][ T5128] do_syscall_64+0xfa/0x760 [ 512.116433][ T5128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.122330][ T5128] RIP: 0033:0x45c27a [ 512.126233][ T5128] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:35:05 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0x2, 0x2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 512.145838][ T5128] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 512.154250][ T5128] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 512.162219][ T5128] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 512.170208][ T5128] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 512.178202][ T5128] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 512.186182][ T5128] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:05 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)}, 0x0) 07:35:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf670000313efea500000000c9ce00000fff07006706000002000000070600000ee60000bf2500003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000480f9ffad43010000000000950000000000000005000000000000009500"/180], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x8002) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x6) 07:35:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) personality(0x400000b) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 512.382182][ T5149] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 512.382182][ T5149] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 512.382182][ T5149] 07:35:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)}, 0x0) [ 512.433799][ T5156] FAULT_INJECTION: forcing a failure. [ 512.433799][ T5156] name failslab, interval 1, probability 0, space 0, times 0 [ 512.456602][ T5156] CPU: 1 PID: 5156 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 512.465718][ T5156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.475786][ T5156] Call Trace: [ 512.475814][ T5156] dump_stack+0x172/0x1f0 [ 512.475834][ T5156] should_fail.cold+0xa/0x15 [ 512.475850][ T5156] ? fault_create_debugfs_attr+0x180/0x180 [ 512.475868][ T5156] ? page_to_nid.part.0+0x20/0x20 [ 512.475881][ T5156] ? ___might_sleep+0x163/0x280 [ 512.475897][ T5156] __should_failslab+0x121/0x190 [ 512.475910][ T5156] should_failslab+0x9/0x14 [ 512.475919][ T5156] kmem_cache_alloc_trace+0x2d3/0x790 [ 512.475930][ T5156] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 512.475943][ T5156] __memcg_init_list_lru_node+0x8a/0x1e0 [ 512.475962][ T5156] __list_lru_init+0x3fe/0x710 [ 512.479347][ T5149] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 512.483665][ T5156] alloc_super+0x762/0x890 [ 512.483684][ T5156] ? test_bdev_super_fc+0x80/0x80 [ 512.509006][ T5156] sget+0x117/0x560 [ 512.509024][ T5156] ? set_bdev_super_fc+0x210/0x210 [ 512.524683][ T5156] mount_bdev+0xff/0x3c0 [ 512.524704][ T5156] ? isofs_bread+0xe0/0xe0 [ 512.570961][ T5156] isofs_mount+0x35/0x40 [ 512.575223][ T5156] ? isofs_readpage+0x30/0x30 [ 512.579919][ T5156] legacy_get_tree+0x113/0x220 [ 512.584686][ T5156] ? ns_capable_common+0x93/0x100 [ 512.589719][ T5156] vfs_get_tree+0x8f/0x380 [ 512.594156][ T5156] do_mount+0x13b3/0x1c30 [ 512.598509][ T5156] ? copy_mount_string+0x40/0x40 [ 512.603458][ T5156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.609697][ T5156] ? copy_mount_options+0x2e8/0x3f0 [ 512.614903][ T5156] ksys_mount+0xdb/0x150 [ 512.619156][ T5156] __x64_sys_mount+0xbe/0x150 [ 512.623845][ T5156] do_syscall_64+0xfa/0x760 [ 512.628449][ T5156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.634344][ T5156] RIP: 0033:0x45c27a [ 512.638247][ T5156] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 512.657866][ T5156] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 512.666281][ T5156] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 512.674266][ T5156] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:35:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) eventfd(0x8001) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)}, 0x0) 07:35:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) epoll_create1(0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 512.682258][ T5156] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 512.690231][ T5156] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 512.698210][ T5156] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:06 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x0) 07:35:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x5) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = dup2(r0, r0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x527, 0x0, 0x0, 0x0, 0x49d8}, [@jmp={0x5, 0x3, 0x7, 0x5, 0x2, 0xffffffffffffffff, 0x1}, @map={0x18, 0xd, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0xffffffffffff379a, 0x41, &(0x7f0000000140)=""/65, 0x41100, 0x2, [], r2, 0xf, r3, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xf}, 0x10}, 0x70) 07:35:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 512.882678][ T5179] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 512.882678][ T5179] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 512.882678][ T5179] [ 512.929851][ T5187] FAULT_INJECTION: forcing a failure. [ 512.929851][ T5187] name failslab, interval 1, probability 0, space 0, times 0 [ 512.951515][ T5187] CPU: 1 PID: 5187 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 512.954381][ T5179] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 512.960601][ T5187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.960607][ T5187] Call Trace: [ 512.960637][ T5187] dump_stack+0x172/0x1f0 [ 512.960657][ T5187] should_fail.cold+0xa/0x15 [ 512.960673][ T5187] ? fault_create_debugfs_attr+0x180/0x180 [ 512.960688][ T5187] ? page_to_nid.part.0+0x20/0x20 [ 512.960704][ T5187] ? ___might_sleep+0x163/0x280 [ 512.960726][ T5187] __should_failslab+0x121/0x190 [ 513.012191][ T5187] should_failslab+0x9/0x14 [ 513.016855][ T5187] kmem_cache_alloc_trace+0x2d3/0x790 [ 513.022483][ T5187] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 513.028281][ T5187] __memcg_init_list_lru_node+0x8a/0x1e0 [ 513.033910][ T5187] __list_lru_init+0x3fe/0x710 [ 513.038664][ T5187] alloc_super+0x762/0x890 [ 513.043068][ T5187] ? test_bdev_super_fc+0x80/0x80 [ 513.048104][ T5187] sget+0x117/0x560 [ 513.051922][ T5187] ? set_bdev_super_fc+0x210/0x210 [ 513.057056][ T5187] mount_bdev+0xff/0x3c0 [ 513.061290][ T5187] ? isofs_bread+0xe0/0xe0 [ 513.065691][ T5187] isofs_mount+0x35/0x40 [ 513.069920][ T5187] ? isofs_readpage+0x30/0x30 [ 513.074668][ T5187] legacy_get_tree+0x113/0x220 [ 513.079419][ T5187] ? ns_capable_common+0x93/0x100 [ 513.084437][ T5187] vfs_get_tree+0x8f/0x380 [ 513.089121][ T5187] do_mount+0x13b3/0x1c30 [ 513.093440][ T5187] ? copy_mount_string+0x40/0x40 [ 513.098455][ T5187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.104694][ T5187] ? copy_mount_options+0x2e8/0x3f0 [ 513.109895][ T5187] ksys_mount+0xdb/0x150 [ 513.114129][ T5187] __x64_sys_mount+0xbe/0x150 [ 513.118800][ T5187] do_syscall_64+0xfa/0x760 [ 513.123297][ T5187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.129175][ T5187] RIP: 0033:0x45c27a [ 513.133159][ T5187] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 513.152834][ T5187] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 513.161233][ T5187] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 513.169191][ T5187] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:35:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_page\x00', 0x2, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x0) [ 513.177148][ T5187] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 513.185103][ T5187] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 513.193058][ T5187] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x80000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:06 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x0) 07:35:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x400000000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x220000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000040)={{0xffffffff7fffffff, 0xfffffffffffffffa}, {0x3, 0x21}, 0x2, 0x5, 0x7eb8000000}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 513.354221][ T5204] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 513.354221][ T5204] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 513.354221][ T5204] 07:35:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 513.401836][ T5204] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:06 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113e1fcde1f4cfdea401d0d642b00c8551a5df416e4000000bf2000000000000007000000080000003d031a000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002edffff060700004c0000001f75ffffffffffffbe54000000000000070400000400f9ffad4301000000000095000000000000000500"/188], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) getpeername$netrom(r2, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @null, @rose, @null, @bcast, @remote, @default, @netrom]}, &(0x7f0000000280)=0x48) 07:35:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = accept4(r0, &(0x7f0000000000)=@ipx, 0xffffffffffffffff, 0x80800) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r4 = dup2(r1, r0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r3, 0x304, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000051}, 0x8000) 07:35:06 executing program 1: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0100001000000000"], 0x0, 0x0, 0x0}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x57) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x2fc4e27b) signalfd4(r2, &(0x7f00000000c0), 0x8, 0x80000) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000080)='.\x00', 0xfe) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) ppoll(&(0x7f0000000380)=[{r5, 0x40}, {r2}, {r4, 0x80}, {r1, 0x4}, {r1, 0x580}, {r5, 0x100}, {r4, 0x4004}, {r3, 0x22}, {r2, 0x114}, {r4, 0xc600}], 0xa, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x47}, 0x8) write$binfmt_elf64(r5, &(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR], 0x18) fcntl$getown(r2, 0x9) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000100)) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) futex(0x0, 0xb, 0x4, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) syz_open_pts(r1, 0x0) ioctl$TCXONC(r1, 0x540a, 0xfff) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0xc) 07:35:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:06 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)=""/137, 0x89, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x1515ad0743b703e5, &(0x7f0000000200)={&(0x7f0000000340)=""/107, 0x6b, r1}}, 0xfffffffffffffd32) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0xa, 0x0, [], [{0x3ff, 0x101, 0x3bbc, 0x7fff, 0x10000, 0xfffffffffffffe01}, {0x6, 0xfef, 0x3ff, 0x6, 0xfff, 0x3d00}], [[], [], [], [], [], [], [], [], [], []]}) readv(r0, &(0x7f00000017c0)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001840)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000001900)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x200100}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x1c, r4, 0x18, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}}, 0x20000000) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) sendto$inet(r0, &(0x7f0000000040)="e47e0183070ac07f59365ff764fd613e5b76814b64f9c8adc06abedaf4c89c9f71e99c86e87bae563a5eac507da7376386131b4176dd8765b70cccfed489827a6eb9f07ecbee148fd1f2793cbe4684805fc44baf53bcbd1f8cbcc0a0a8e75c4160629da7c8f180ebde29f1d8acbaa709932bac04c4f7a664bd", 0x79, 0x801, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) [ 513.552296][ T5224] debugfs: File '5217' in directory 'proc' already present! 07:35:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000080007000000080000003d0301000400000005000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000000000000000000000000000000000009a526ed8d20d8070da9743f356fc9c518600a59f8a64dd471aa9b8a59a2a6203a21d8942fecb091297d55785574fa2dc7ab514e440c95223613502b6d919c691fefd45931dd5d70bda9e7e332f423ccf7eef"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xffffff57, 0x0, &(0x7f0000000080)="73dec0ee8271ae3772f4e0d73ead7614ded694e34730c00b0b2bf14bc4f05b", 0x0, 0x401}, 0x24a) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000140)={0x8001, 0x9}) [ 513.607490][ T5222] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 513.607490][ T5222] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 513.607490][ T5222] [ 513.632453][ T5224] binder: 5217:5224 unknown command 268435457 07:35:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 513.650011][ T5222] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 513.668226][ T5224] binder: 5217:5224 ioctl c0306201 20012000 returned -22 [ 513.744744][ T5233] FAULT_INJECTION: forcing a failure. [ 513.744744][ T5233] name failslab, interval 1, probability 0, space 0, times 0 [ 513.801670][ T5233] CPU: 0 PID: 5233 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 513.810742][ T5233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.810749][ T5233] Call Trace: [ 513.810777][ T5233] dump_stack+0x172/0x1f0 [ 513.810798][ T5233] should_fail.cold+0xa/0x15 [ 513.810814][ T5233] ? fault_create_debugfs_attr+0x180/0x180 [ 513.810832][ T5233] ? page_to_nid.part.0+0x20/0x20 [ 513.810846][ T5233] ? ___might_sleep+0x163/0x280 [ 513.810860][ T5233] __should_failslab+0x121/0x190 [ 513.810875][ T5233] should_failslab+0x9/0x14 [ 513.810885][ T5233] kmem_cache_alloc_trace+0x2d3/0x790 [ 513.810898][ T5233] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 513.810913][ T5233] __memcg_init_list_lru_node+0x8a/0x1e0 [ 513.810926][ T5233] __list_lru_init+0x3fe/0x710 [ 513.810941][ T5233] alloc_super+0x762/0x890 [ 513.810961][ T5233] ? test_bdev_super_fc+0x80/0x80 [ 513.842447][ T5233] sget+0x117/0x560 [ 513.842463][ T5233] ? set_bdev_super_fc+0x210/0x210 [ 513.842477][ T5233] mount_bdev+0xff/0x3c0 [ 513.842497][ T5233] ? isofs_bread+0xe0/0xe0 [ 513.857298][ T5233] isofs_mount+0x35/0x40 [ 513.872968][ T5233] ? isofs_readpage+0x30/0x30 [ 513.872984][ T5233] legacy_get_tree+0x113/0x220 [ 513.873008][ T5233] ? ns_capable_common+0x93/0x100 [ 513.930019][ T5233] vfs_get_tree+0x8f/0x380 [ 513.934455][ T5233] do_mount+0x13b3/0x1c30 [ 513.938800][ T5233] ? copy_mount_string+0x40/0x40 [ 513.943748][ T5233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.949986][ T5233] ? copy_mount_options+0x2e8/0x3f0 [ 513.955194][ T5233] ksys_mount+0xdb/0x150 [ 513.959451][ T5233] __x64_sys_mount+0xbe/0x150 [ 513.964129][ T5233] ? do_syscall_64+0xea/0x760 [ 513.968806][ T5233] do_syscall_64+0xfa/0x760 [ 513.973319][ T5233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.979214][ T5233] RIP: 0033:0x45c27a [ 513.983118][ T5233] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 514.002937][ T5233] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 514.011363][ T5233] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 514.019337][ T5233] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 514.027308][ T5233] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 514.035279][ T5233] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 514.043253][ T5233] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:07 executing program 4 (fault-call:0 fault-nth:85): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x280000, 0x0) getpeername$netrom(r1, &(0x7f0000000600)={{0x3, @rose}, [@null, @null, @netrom, @rose, @bcast, @netrom, @netrom, @rose]}, &(0x7f00000005c0)=0xfffffec6) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xa60) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000200)=0xe8) getsockname$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000500)={@remote, 0x0}, &(0x7f0000000540)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000700)={@empty, @remote, 0x0}, &(0x7f0000000740)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000008c0)={@remote, 0x0}, &(0x7f0000000900)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a00)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000c40)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'irlan0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d00)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000d40)={0x0, @initdev, @multicast1}, &(0x7f0000000d80)=0xc) getpeername$packet(r1, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e00)=0x14) accept4$packet(r1, &(0x7f0000001300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001340)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001400)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000001500)=0xe8) accept4$packet(r1, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001580)=0x14, 0x80800) recvmsg$kcm(r1, &(0x7f0000001840)={&(0x7f00000015c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001640)=""/107, 0x6b}, {&(0x7f00000016c0)}, {&(0x7f0000001700)=""/251, 0xfb}], 0x3}, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001880)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000001980)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000019c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000001a00)=0xc) accept$packet(r0, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a80)=0x14) accept4$packet(r1, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001e00)=0x14, 0x80800) getpeername$packet(r1, &(0x7f0000001ec0)={0x11, 0x0, 0x0}, &(0x7f0000001f00)=0x14) r24 = semget(0x3, 0x3, 0x1) semctl$GETNCNT(r24, 0x3, 0xe, &(0x7f0000000580)=""/28) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000027c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000002780)={&(0x7f0000001f40)={0x804, r2, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x138, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x260, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x4, 0x2, 0x7f, 0x1}, {0xffffffffffffffc0, 0xc906, 0x9, 0x7f}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xbde5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x755d}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6c8c}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x144, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x10001, 0x0, 0x7}, {0xffffffff, 0x9, 0xad3a, 0x400}, {0x6, 0x8, 0x401, 0xfe}, {0x2, 0x200, 0x3, 0xe51e}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xc4e}}}]}}, {{0x8, 0x1, r17}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x238, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6fa2bc51}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x804}, 0x1, 0x0, 0x0, 0x800}, 0x80) 07:35:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) read(r0, &(0x7f0000000080)=""/204, 0xcc) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000040)=0xc, 0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 514.174333][ T5250] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 514.174333][ T5250] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 514.174333][ T5250] [ 514.232849][ T5224] debugfs: File '5217' in directory 'proc' already present! [ 514.255616][ T5258] FAULT_INJECTION: forcing a failure. [ 514.255616][ T5258] name failslab, interval 1, probability 0, space 0, times 0 [ 514.259330][ T5250] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 514.296199][ T5258] CPU: 1 PID: 5258 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 514.305277][ T5258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.305283][ T5258] Call Trace: [ 514.305309][ T5258] dump_stack+0x172/0x1f0 [ 514.305329][ T5258] should_fail.cold+0xa/0x15 [ 514.305345][ T5258] ? fault_create_debugfs_attr+0x180/0x180 [ 514.305361][ T5258] ? page_to_nid.part.0+0x20/0x20 [ 514.305380][ T5258] ? ___might_sleep+0x163/0x280 [ 514.343266][ T5258] __should_failslab+0x121/0x190 [ 514.348209][ T5258] should_failslab+0x9/0x14 [ 514.352808][ T5258] kmem_cache_alloc_trace+0x2d3/0x790 [ 514.358714][ T5258] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 514.364612][ T5258] __memcg_init_list_lru_node+0x8a/0x1e0 [ 514.370245][ T5258] __list_lru_init+0x3fe/0x710 [ 514.375011][ T5258] alloc_super+0x762/0x890 [ 514.379436][ T5258] ? test_bdev_super_fc+0x80/0x80 [ 514.384477][ T5258] sget+0x117/0x560 [ 514.388301][ T5258] ? set_bdev_super_fc+0x210/0x210 [ 514.393418][ T5258] mount_bdev+0xff/0x3c0 [ 514.397668][ T5258] ? isofs_bread+0xe0/0xe0 [ 514.402085][ T5258] isofs_mount+0x35/0x40 [ 514.406324][ T5258] ? isofs_readpage+0x30/0x30 [ 514.411014][ T5258] legacy_get_tree+0x113/0x220 [ 514.415800][ T5258] ? ns_capable_common+0x93/0x100 [ 514.421104][ T5258] vfs_get_tree+0x8f/0x380 [ 514.425539][ T5258] do_mount+0x13b3/0x1c30 [ 514.430059][ T5258] ? copy_mount_string+0x40/0x40 [ 514.435018][ T5258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.441273][ T5258] ? copy_mount_options+0x2e8/0x3f0 [ 514.446488][ T5258] ksys_mount+0xdb/0x150 [ 514.450734][ T5258] __x64_sys_mount+0xbe/0x150 [ 514.455430][ T5258] do_syscall_64+0xfa/0x760 [ 514.459954][ T5258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.465866][ T5258] RIP: 0033:0x45c27a [ 514.469771][ T5258] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:35:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x200, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x800, @link='syz0\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x0) r3 = msgget$private(0x0, 0x400) msgrcv(r3, &(0x7f0000000480)={0x0, ""/205}, 0xd5, 0x3, 0x3000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000340)=0x2) 07:35:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 514.489381][ T5258] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 514.497800][ T5258] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 514.505860][ T5258] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 514.513836][ T5258] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 514.521820][ T5258] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 514.529797][ T5258] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:07 executing program 4 (fault-call:0 fault-nth:86): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 514.676925][ T5268] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 514.676925][ T5268] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 514.676925][ T5268] [ 514.744400][ T5278] FAULT_INJECTION: forcing a failure. [ 514.744400][ T5278] name failslab, interval 1, probability 0, space 0, times 0 [ 514.748678][ T5268] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 514.776818][ T5278] CPU: 1 PID: 5278 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 514.785902][ T5278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.796048][ T5278] Call Trace: [ 514.799371][ T5278] dump_stack+0x172/0x1f0 [ 514.803711][ T5278] should_fail.cold+0xa/0x15 [ 514.808306][ T5278] ? fault_create_debugfs_attr+0x180/0x180 [ 514.814119][ T5278] ? page_to_nid.part.0+0x20/0x20 [ 514.819147][ T5278] ? ___might_sleep+0x163/0x280 [ 514.824000][ T5278] __should_failslab+0x121/0x190 [ 514.829194][ T5278] should_failslab+0x9/0x14 [ 514.833695][ T5278] kmem_cache_alloc_trace+0x2d3/0x790 [ 514.839324][ T5278] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 514.845133][ T5278] __memcg_init_list_lru_node+0x8a/0x1e0 [ 514.850781][ T5278] __list_lru_init+0x3fe/0x710 [ 514.855635][ T5278] alloc_super+0x78d/0x890 [ 514.860049][ T5278] ? test_bdev_super_fc+0x80/0x80 [ 514.865069][ T5278] sget+0x117/0x560 [ 514.868878][ T5278] ? set_bdev_super_fc+0x210/0x210 [ 514.873992][ T5278] mount_bdev+0xff/0x3c0 [ 514.878235][ T5278] ? isofs_bread+0xe0/0xe0 [ 514.882649][ T5278] isofs_mount+0x35/0x40 [ 514.886893][ T5278] ? isofs_readpage+0x30/0x30 [ 514.891573][ T5278] legacy_get_tree+0x113/0x220 [ 514.896340][ T5278] ? ns_capable_common+0x93/0x100 [ 514.901378][ T5278] vfs_get_tree+0x8f/0x380 [ 514.905831][ T5278] do_mount+0x13b3/0x1c30 [ 514.910166][ T5278] ? copy_mount_string+0x40/0x40 [ 514.915110][ T5278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.921373][ T5278] ? copy_mount_options+0x2e8/0x3f0 [ 514.926593][ T5278] ksys_mount+0xdb/0x150 [ 514.930865][ T5278] __x64_sys_mount+0xbe/0x150 [ 514.935650][ T5278] do_syscall_64+0xfa/0x760 [ 514.940165][ T5278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.946056][ T5278] RIP: 0033:0x45c27a [ 514.949962][ T5278] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 514.969572][ T5278] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 514.977992][ T5278] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 514.985959][ T5278] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:35:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x4, 0x20000) ioctl$NBD_DISCONNECT(r2, 0xab08) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x300, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x4, 0x7, 0x1c2}, &(0x7f0000000100)=0x10) [ 514.993926][ T5278] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 515.001900][ T5278] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 515.009880][ T5278] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:08 executing program 1: creat(&(0x7f0000000140)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:35:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:08 executing program 4 (fault-call:0 fault-nth:87): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 515.169913][ T5290] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 515.169913][ T5290] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 515.169913][ T5290] [ 515.216144][ T5290] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 515.240789][ T5299] FAULT_INJECTION: forcing a failure. [ 515.240789][ T5299] name failslab, interval 1, probability 0, space 0, times 0 [ 515.262717][ T5299] CPU: 1 PID: 5299 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 515.271805][ T5299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.281866][ T5299] Call Trace: [ 515.285178][ T5299] dump_stack+0x172/0x1f0 [ 515.289520][ T5299] should_fail.cold+0xa/0x15 [ 515.294165][ T5299] ? fault_create_debugfs_attr+0x180/0x180 [ 515.299979][ T5299] ? page_to_nid.part.0+0x20/0x20 [ 515.305007][ T5299] ? ___might_sleep+0x163/0x280 [ 515.309863][ T5299] __should_failslab+0x121/0x190 [ 515.314808][ T5299] should_failslab+0x9/0x14 [ 515.319308][ T5299] kmem_cache_alloc_trace+0x2d3/0x790 [ 515.324695][ T5299] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 515.330503][ T5299] __memcg_init_list_lru_node+0x8a/0x1e0 [ 515.336134][ T5299] __list_lru_init+0x3fe/0x710 [ 515.340900][ T5299] alloc_super+0x762/0x890 [ 515.345318][ T5299] ? test_bdev_super_fc+0x80/0x80 [ 515.350344][ T5299] sget+0x117/0x560 [ 515.354159][ T5299] ? set_bdev_super_fc+0x210/0x210 [ 515.359277][ T5299] mount_bdev+0xff/0x3c0 [ 515.363521][ T5299] ? isofs_bread+0xe0/0xe0 [ 515.367935][ T5299] isofs_mount+0x35/0x40 [ 515.372178][ T5299] ? isofs_readpage+0x30/0x30 [ 515.376859][ T5299] legacy_get_tree+0x113/0x220 [ 515.381714][ T5299] ? ns_capable_common+0x93/0x100 [ 515.386738][ T5299] vfs_get_tree+0x8f/0x380 [ 515.391156][ T5299] do_mount+0x13b3/0x1c30 [ 515.395489][ T5299] ? copy_mount_string+0x40/0x40 [ 515.400436][ T5299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.406679][ T5299] ? copy_mount_options+0x2e8/0x3f0 [ 515.411875][ T5299] ksys_mount+0xdb/0x150 [ 515.416118][ T5299] __x64_sys_mount+0xbe/0x150 [ 515.420801][ T5299] do_syscall_64+0xfa/0x760 [ 515.425307][ T5299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.431195][ T5299] RIP: 0033:0x45c27a [ 515.435087][ T5299] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 515.454691][ T5299] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 515.463116][ T5299] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 515.471091][ T5299] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 515.479064][ T5299] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 515.487032][ T5299] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 515.494999][ T5299] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:08 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x9f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:35:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x100000001, @rand_addr="f711b93bc6e73b4a12a6b6ba0188ccdd", 0x1000}], 0x1c) getpeername$inet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 07:35:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/326], &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_int(r1, 0x0, 0x13, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400000, 0x100) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="a4000000f2c320f973a2603a21eb66046d337481ef444ba838d04558e27d41fd232866ca28c3d6c68d34c5a2fa821b9a370891ce564ed8f516fae7b045fbbe78d80c81a773e860628d473ae302a0a26b81ea09c553a6b9d7ef4f0a00c97ab74a507421fa549fda4f3e45276deb6ac9ed10e1e474f1da35fbdbf9c023c70ba979c02db98b19e26c2db82cf3521e0f2bf1ca635b4b0214f67b810184813cfcb34698fdc3f426d379fa"], &(0x7f0000000280)=0xac) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000400)={0xc1, 0x3, 0x202, 0x9, 0x5, 0x51, 0x2, 0x6, r2}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x3, @rand_addr="4f8acc01e932e1890c24ee1b13980886", 0x8}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r3, 0x1}, &(0x7f0000000240)=0x8) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r4 = userfaultfd(0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r5, 0x4004ae86, &(0x7f0000000040)=0x100000000) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = getpgid(0xffffffffffffffff) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000000)=r6) lseek(r5, 0x0, 0x7) 07:35:08 executing program 4 (fault-call:0 fault-nth:88): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:08 executing program 1: rename(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x1002000, 0x0) 07:35:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000086113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf010000001200000400000400f9ffad43c2e34d010000000000950000000000800005000000000000009500000000000000007806a16c0539a12ae086c26618ac0d469c8a3c59e179200e1a19da61a962f4b8565cdbb12f8b48d384ad508dca14e79abfcbe8da5b2c5d3f5eba13e5497422071e8dc4168ec73704bb9a02"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x2}, 0xfffffcd4) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000200), &(0x7f00000003c0)=0x0) getgroups(0x4, &(0x7f0000000400)=[r1, r2, r3, r4]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) close(r0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x801, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000100)=0x2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4800, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) [ 515.682526][ T5314] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 515.682526][ T5314] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 515.682526][ T5314] [ 515.710765][ T5322] FAULT_INJECTION: forcing a failure. [ 515.710765][ T5322] name failslab, interval 1, probability 0, space 0, times 0 [ 515.715153][ T5314] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 515.762027][ T5322] CPU: 1 PID: 5322 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 515.771109][ T5322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.781169][ T5322] Call Trace: [ 515.784659][ T5322] dump_stack+0x172/0x1f0 [ 515.788994][ T5322] should_fail.cold+0xa/0x15 [ 515.793589][ T5322] ? fault_create_debugfs_attr+0x180/0x180 [ 515.799415][ T5322] ? page_to_nid.part.0+0x20/0x20 [ 515.804440][ T5322] ? ___might_sleep+0x163/0x280 [ 515.809292][ T5322] __should_failslab+0x121/0x190 [ 515.814254][ T5322] should_failslab+0x9/0x14 [ 515.818755][ T5322] kmem_cache_alloc_trace+0x2d3/0x790 [ 515.824129][ T5322] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 515.829938][ T5322] __memcg_init_list_lru_node+0x8a/0x1e0 [ 515.835572][ T5322] __list_lru_init+0x3fe/0x710 [ 515.840343][ T5322] alloc_super+0x78d/0x890 [ 515.844848][ T5322] ? test_bdev_super_fc+0x80/0x80 [ 515.849880][ T5322] sget+0x117/0x560 [ 515.853774][ T5322] ? set_bdev_super_fc+0x210/0x210 [ 515.858891][ T5322] mount_bdev+0xff/0x3c0 [ 515.863132][ T5322] ? isofs_bread+0xe0/0xe0 [ 515.867547][ T5322] isofs_mount+0x35/0x40 [ 515.871789][ T5322] ? isofs_readpage+0x30/0x30 [ 515.876468][ T5322] legacy_get_tree+0x113/0x220 [ 515.881238][ T5322] ? ns_capable_common+0x93/0x100 [ 515.886262][ T5322] vfs_get_tree+0x8f/0x380 [ 515.890678][ T5322] do_mount+0x13b3/0x1c30 [ 515.895015][ T5322] ? copy_mount_string+0x40/0x40 [ 515.899952][ T5322] ? copy_mount_options+0x270/0x3f0 [ 515.906709][ T5322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.912956][ T5322] ? copy_mount_options+0x2e8/0x3f0 [ 515.918156][ T5322] ksys_mount+0xdb/0x150 [ 515.922407][ T5322] __x64_sys_mount+0xbe/0x150 [ 515.927089][ T5322] do_syscall_64+0xfa/0x760 [ 515.931600][ T5322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.937576][ T5322] RIP: 0033:0x45c27a [ 515.941567][ T5322] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:35:09 executing program 1: [ 515.961256][ T5322] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 515.969664][ T5322] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 515.977642][ T5322] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 515.985608][ T5322] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 515.993664][ T5322] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 516.001650][ T5322] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) [ 516.066135][ T5331] Unknown ioctl 21530 07:35:09 executing program 1: 07:35:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 516.091266][ T5331] Unknown ioctl 21530 07:35:09 executing program 4 (fault-call:0 fault-nth:89): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0xfffffffffffffdb7, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) sendmsg$tipc(r1, &(0x7f0000001340)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x3}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000340)="589e8fe4f2c1d3e5b3bebe0f9872e0567d74e227e3e5e789c11ca67eb6ce38f18585f87563331f2e5656a6e6304bfec49f3b6a51a5fb9a29b3b6d10013a5450b1da9c45bcad8eed318935afa46c0235b57489110a6ae1a0d482e9f794a8652b77a5da2a032dc1f28e0e26100efdce3e6935669ae451ce61490c6cbc09d71dddc569fc1862467f8bfa6935b13dd746f3f575385165bfdc0a5e7fb05cbf335848f7d8745c8f3f106b16a859387d49a89c5187c382e6aea2f09430897ced3e56a1f372e7b5be6b980cc1b19d9d782807488bad748bd0f1628d388f8ee8777fadd25991cfcc759d8e9156aa3c71f44a3ce050a6d2f3707bf94b885dc86791cf734d3ab9881cd7718c8befb2e081e6d87b4769ea451ae5f9d5b41b8fb73506ce38dd96cd084d7e4051354b04d7feebed2bf94d2b396910b10718cbf7af6b70327454b0e83c0c5106929a8a625f40c813b836b8c4aa441c2a25f2f698e1b7af0b15765a42e75ca78751df767a72f001bc5a6563627234a4a04aea4f8375fb990f5a9ba6feea8a33c3a2a09f0b5e53b58d3f337c85ed0c9fce86743e3ab7c2760bc7b0762fa35f744e277ecc66c0c397fdb25201f2276780f4e412b95e8f212ef2a5730285d5cd875fc476e7bb5ca7a1cf08dc1654b9221e0add6f8d2bc85de1124aa550f7d3d61691d5cc55ec452d0019709f83f737da5294d913f724654f7ab8c7753b25bfbfa4bef5a54836eb7e1a57937928dbf7dca41991fe74cc04596e5a58b6f11a18ef87d761adbf8e323190427756656007bb49b9c0ff7d19c17a5c68159e8980a23f8c2ff9329304f504ef84df857cbc8635596d235131679eed078b4dbdb0a1b2e9602968813ed289db4edd107d4d9875658b05fffde140d25e6ce53b72cdc2e9d877e693205fb9e1d8f048fba49f6da3f4e9ed663debfc1b6f9e09edf10e08db99aa2ebbc80d73ea5c2e88317d350f40adba55ff0bf1a66e556bfd2929f7dc2c2a9552e77220df6e9e1eed310eb87920ca2f55c11d834467568ecfacde46126d2b688d86c7d8b2ed06253806402a89493995e29c344c06490450585268680843b71972ffffbc506ce289134518fcfeb8a66e47af89d5d1b3d8ac70f986ec1091b6484c2663b002697c7175a2e46475a5e9d0fa54aa2d4e76b9a13e14c0e8252c7d58d84b27a9a99bb5c4995876455c7412bb757b81806b6c86c462d21a4ef4c95db6d5f9030421e975b572c2b797f5bca8e345ed7400e60780a977baa73a55e5f3a5dc4b3af2b93fbe4b88ee789e072bfa998f0f5f27ff15620b749dac9ccb6a050b8c87f0904b3cd3734630a6b5a85ce7b3d011a260ff3b995733fe8bc02c5bf8251c25757664a66001c6629c9c7a10c0cad03d26f596caf79d7978d80da2f3548dc1f65018e1a81ce3cdf31954231efcf9ff01c4f290755301fcf88c7fcdd8bd87cd51689b0cd9d10202aa646a9f6fd4ac0d85b94e4b718be53e9647aed2cc4ff622ce8745327965a7a55d1feba532afc115bbb39f78504a9ecc1af3dc385bbc8bb6b6aa86727b76c321dda8b8100f8f1231ec425c1ee9066e8c1e839c051c18d1a11ab3b87bd986de57dbfaf646d17d7758d47ddf087b57d01e39b3d1b0d5447054f3acf2432797c320ce101742013fad76dbb854c4239c26612768094036b82a92b192541cf3f4f6eafa0a691300c3722eddc9582f28446ec0f3e1486891cd011c515074eada7a6677b14c244581e6fe151a16b658c303554d39205f865298a76e008ce0e77fcb40891e0845b1a7dd41f40fe25c34413616d1bf01223fbcc92ba5b71f38dceca3eb337a2d9bb07b931376d9531ef96245de2b3ca23096ca0527837fb688acd99069163d4eb0df9ceb95b74041cbac9908254473932248c0ab3d47dd84767c8e8582951c457d2571e19f27eb02b0df86cbdf259a35a10bd7290202219892b8f17229b3a51b8254ab7a60713af0957c447607c7eeb80b87fd19c99dcc84803884fccd72f29e29779ab63ed4ff20eb790cd8d5e7e1a64533bf6a07f89e7561e079e8357ed77cc48d62e23da61441fdc093b857c905390f3260b7a97b31d1eb41a4edc721889be705017502fe8062368c7b83e2111efb920a3937c349401ccff6170e9c43c5d7278b80fc17a6cd288bf6498b3fee35aac3bfb6a359d9e4a02d9917c47c577864a97f1770994d48181e746643d7e9cf3a49e7b890bf48ec4fb7b569641c30b7d92c515784e564ba754d53a47709e1fe4ae1b4342abd9c17692363c98cc6286dd7c63145ba9a4f0cd014fbdf80727b218c0355d309bef080861f9aa088de899a04c510d0732697bb6fd41444d6a0bffb53ee4e94a19d2ef870230ed1fc2b54e7ca5d4e27be2f75415c0ce08313b8e866ded67534267cf58f859356efdffab380a9c654c2c19be44afa944ae6e87444027371d09634834869dcbdc757621023c3fb7fd0bfd8107de900ea56a974fbf0d56a4ccc4981ca069b82a55e243ea4b031363da339e6ae9ef194d0e3923d6fc3bbcf176e33bb8ed94921357ffb407639f8aecdc47328c237933cdf45ed76957048c0cd3b4c288cfa9dcd02e8eedcbb8935e38fdbdeb6b5d95fa2a87ac8ceb14561176f8eea0ef2e5f1ab5ccd1ee4f017fa33fc8991761ecd7e739d74a9d05e85299017730a6150415e45bd019fcab3eca8bd4c8ef8f68088439f7f71d08ea41b3bca9b8f160806a64e441cbda4bdfcee0ebc238b3a3a58ed70c41ccc16f740aef80a132de965060d09b7d88b6605b8c52de3f45866c34e580830551a22bf0584e931a59d7dc4d3bd8ceda385cd009c295f84c82d5b06a5be48ff49023d5f3a0eebdf737cea7975dd0269496f4376f7fe9f0ed1e7827856c92776fba2370a1686667669fd0d31ef4d1453855adbd7bc3740704c8a406151a32b36e1d92843197b62f7e12e8c1c93f4098e7e7423a4981e0c2fc5deb04f171d5cc4497e6cd0fdda84d7fdb90391fff5e61fa8bf896512772c9892e07b01b5b01e7d91a6485ec335c2bdf3b33cfb5ff36dac1ca5491627c6e9d30f2ee3a3bea8696cca234567a48326f2a4f51fa83f7cd80b54e8e5fcbf6bf4581bf3140b7cc11b9b97b124be9feb28e07057a5f7c670469437d648ed1fae86be4b58d883a412ed2ea3b80be880ea513139d76215c3dede17db059301389f89be528610a45c9f1d60f1f86c6dc0977d4dc35ccee825ae3e7c0e1afe68b421d9492dab3b19eeb7391f49cc830c5f5edd7584160dff7dd65ebadddb7221bda7202ccb3cce99262a37a8ae6c33402bbeaab250e2bed3b9bb7fd90e493b4876dd66e2c891069c9a8d04f3e517f92f957d7858fc0f507a45b29002226dad01912f00b28b37afa230f19ac7034aecf928ce4633f6d6ac09eafed153ed8ce6be88cbe4808266dbff22f3303ce1fa1bde866097b70e4b57709e4c656c55a90ff0f0ea76b6ce73abc5719f2f70761db79742208353e705f216e17e6c7858b6a624c68a2f257a01ddb4b544f3d418d1b6a762493e9e3145ca38c50268aa203372cfd529979db032cde2ae177e5d89bb84472c645a154d789e175a9ae32a1ea6a6595bcf43a0c90d8727d596725b3815123f07ac2bec6707104126f87f019abfd24bd18d42c1cdfae95c477616a3d5009a77a696e8d5ba48f19256a307eb3e7b7cdf698b4372efabe96481f2bac8eb4b98754762bcea6fb31a7c69acf64e63288ee11e348c5a307e87b7436d399bb45967c397f7957aaf88798eff45551011ef12a920694e82be3747fdad0635c32d15d00039fbb3c5bf1e837ff33c71aea1159eb3ec92905d95ce9a7e8dfb10aedab289fddb75b2647fd215abcb67bec8200f82ca1e6eb926446207b7c70fec0e1ea105795a994812d8a70d2db812e1008951f7ee7e4c1c4dbd24f978d12e7f22dd75ab27530c1c4c92dfdb0d5f7612c3467fa843b310cc760861740ae876368aeb3355464474afc4087ef55d981c3aba3170f231ed8e5a77454f9ab454141712c9a6a8532622ce7ca93010ad2b158de1b97801d30730553b6bcaed5e31640409d39ae93d66e6c916dfae941f12c06eb8d3d9a44ca710abda95aadd093392bc401af634ee4ffbaa00604e6df58d92280777268b257ac81460a76e219fa926fe038c452f3e67db2baf757d0b01b92cef440c686e56ed90ee8c66c5bb2e0d083056c6aa35342164eb8c5ce648e0212dfd431c87c41b1cdc383dac1f84469d562ec2031cf8bb8854a2bffce06be2b6a853d99b055f9e354f29da89b4a63010e84fc2faa5208e5f06032a99149597c5369ac4dbdd76ac01c9b2eab04e955c9c7ee698e0fe06ea643674b37c0a78657954ee8f3181582bd063aa29c5d633aa929bf0539be818547b1c1c9bcd1f785fc6ccce47564c667d8cbdb08eaf6712bec4a97317ad3dcf2e47615592a3f9e247f9149e22b089f434fcba87921466c669b5951ba6cde618abf8c30d12e1a5ec03f1a2a446ffed32067b82bd780b499ab56b94460d0811ae31cc63addea9a9007842b1122c7f092498b9ab5e0b4b5ed19d0463e5ca8fa4eda5b99a8b4e4f713224caf346938f558b5368adcf2c0ae4ad8c5d5ac9b19c844b6c02b256d7c6159e739be27630a125b62914d6e760e744ee18f8fc6b70ff7b159989e904d8f90d34996c9296f0d899691d20ff5398e923832382d5e5658755db4221c43e22bcd5ea60b45b4706a863b825492d5cc91583b24f6565530d20470ab2c5288672d0d303fbcd839c89b593d686a09769d9b0b698598e35ef9bbd0163c989a8fa535e8a647224d76cb9874581724f13d76df41804dabe2faf896615c038a9ac7e801119b46e85f04f4d27c017f63a434a52527c6a401808c57dfda84058293a0f66a81bf6c5daf985ff8519e4b562119f09a9970741ec46cae5b758368b8f82b22db9ef7df45d731cc9a433f184c6657510e91c7a75c787336189b443cb4f02be3f6a78da2b1e856230d827a9c6341712fe45f7a5479a89f60285d0542e0440765cddf2569745d83077d95dc1f32a68756b9ea42b31a19ce95d9b1dcd8a821c8ba08f2213a4518018f1ed5b60e82e69f1da32311c87c6e31d5a13911f4089ebdd59b9817678e7b94efe128fd53001ef030037770324d40d56872ee622358cb3b1f2ee564e5d80190abb7923bd75833c93ba91f3e700f10b704da79e3ff5a8b3c753686c7d7e2f9caee11ace4190ac53d6446644b456fa7643eb353024931246ef0761dadc210ce6502bba6425dd15e9c8becdcacabb6f4e01233d44382c16c7b442f38bdef0668a797b7fbb8d33461714d684705923897919eaafccefea57d38856b6d5206c286bce334ebbcabf4e0c7ab988f52e45cf64826a4286596629d1f5cca7467fe7f8aca6650bba791dc9525bb1bbbf9f5afb2ba2b02cb7038b8db5b6b4ecd0c8f634e83068b326612638513886952cbe610f1b31b57638c7739a7531b7efd0b4b87a3d23be7fd9ca3417614cc4ae979a6f65532a3e6928196f2906b7fc1d7c106fb76b0e3f1087f34324e05cab267179d123758e92014475df39c16f50907c549b5c481218b16fb37923058cecd72abbe2e382a9df28157106c922d6a7176a3071da870ff98f0bc6d52a7c209fce0a245a66ec820d2d1e2daf76103d1739323cff92cbf79878beb6873ffe25a86af8669d100603df813fe436efc4a725e038eedf13d8b631aac7b31a3d9225dac311154874edd9cbdb9f13e3f94d6322c57fcb094f55540774373bcb77c8db9f53ae985c3ec3926dbd4245f8908b7005a", 0x1000}, {&(0x7f0000000140)="cce17e556e41e3bd9f102c6afd15756807d6859ca2cf6e1a038f680930f6f57dce6615c19dd200efb9abd7387af95184f32604fa98ed407ce848dce2ac6f52", 0x3f}, {&(0x7f0000000180)="5db039c2b1b43c79e7256a048adb20c90c8994cee12855fb080ebdd3a25db514c677bed723c94392b9b9191bd042b8e799235a9d0b04d65005f366e4d93939c2270bc6f0d4572e5cc330e2e2a8f148f211e2edfa1415388ec7f0ee61c57b47361a7fb30da93a0dc09dacf1b10433dfb0319af26a8b46f3b074", 0x79}], 0x3, 0x0, 0x0, 0x4048000}, 0x84) 07:35:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x200000c, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="210000000300000000000000000000000100d371cf1b3c23433dad46ef771ed201e4e97d510000000000603ba028c7e7e9d8b679ee2ea926e325b1659085838fc83dfb9b76b32a05bad8e9ee2b3fa90b1f0684d84593da32e32fa44ee0cfe40837928505a1c94b3e66c8c48798bcedce6ce283f8372d4377013607ef8e610e24790cd19f"], 0x21) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000100)={r3, &(0x7f0000000080)=""/128}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) [ 516.182489][ T5340] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 516.182489][ T5340] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 516.182489][ T5340] [ 516.206498][ T5345] FAULT_INJECTION: forcing a failure. [ 516.206498][ T5345] name failslab, interval 1, probability 0, space 0, times 0 [ 516.222043][ T5345] CPU: 1 PID: 5345 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 516.231091][ T5345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.231098][ T5345] Call Trace: [ 516.231125][ T5345] dump_stack+0x172/0x1f0 [ 516.231144][ T5345] should_fail.cold+0xa/0x15 [ 516.231160][ T5345] ? fault_create_debugfs_attr+0x180/0x180 [ 516.231176][ T5345] ? page_to_nid.part.0+0x20/0x20 [ 516.231192][ T5345] ? ___might_sleep+0x163/0x280 [ 516.231211][ T5345] __should_failslab+0x121/0x190 [ 516.231229][ T5345] should_failslab+0x9/0x14 [ 516.231240][ T5345] kmem_cache_alloc_trace+0x2d3/0x790 [ 516.231252][ T5345] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 516.231268][ T5345] __memcg_init_list_lru_node+0x8a/0x1e0 [ 516.231281][ T5345] __list_lru_init+0x3fe/0x710 [ 516.231304][ T5345] alloc_super+0x762/0x890 [ 516.231317][ T5345] ? test_bdev_super_fc+0x80/0x80 [ 516.231335][ T5345] sget+0x117/0x560 [ 516.313326][ T5345] ? set_bdev_super_fc+0x210/0x210 [ 516.318421][ T5345] mount_bdev+0xff/0x3c0 [ 516.322645][ T5345] ? isofs_bread+0xe0/0xe0 [ 516.327044][ T5345] isofs_mount+0x35/0x40 [ 516.331271][ T5345] ? isofs_readpage+0x30/0x30 [ 516.336024][ T5345] legacy_get_tree+0x113/0x220 [ 516.340773][ T5345] ? ns_capable_common+0x93/0x100 [ 516.345814][ T5345] vfs_get_tree+0x8f/0x380 [ 516.350211][ T5345] do_mount+0x13b3/0x1c30 [ 516.354521][ T5345] ? copy_mount_string+0x40/0x40 [ 516.359447][ T5345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.365759][ T5345] ? copy_mount_options+0x2e8/0x3f0 [ 516.370950][ T5345] ksys_mount+0xdb/0x150 [ 516.375174][ T5345] __x64_sys_mount+0xbe/0x150 [ 516.379834][ T5345] do_syscall_64+0xfa/0x760 [ 516.384323][ T5345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.390197][ T5345] RIP: 0033:0x45c27a [ 516.394162][ T5345] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 516.413746][ T5345] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 516.422139][ T5345] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a 07:35:09 executing program 1: 07:35:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:09 executing program 1: 07:35:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x400000000011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket(0x2, 0x1, 0x2) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000000)={@bcast, @null, @default, 0x4d7a9b75bbe8e023, 0xa8, 0x5, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) [ 516.430092][ T5345] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 516.438047][ T5345] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 516.446000][ T5345] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 516.453967][ T5345] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 [ 516.472130][ T5340] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xfffffe06, 0x10, &(0x7f0000000340)={0x3}, 0xfe57}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80, 0x800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0xffffffffffff370e, 0x1ff, @remote, 0x7}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0xffffffffffffd01a, @dev={0xfe, 0x80, [], 0x23}, 0x86}], 0x48) 07:35:09 executing program 4 (fault-call:0 fault-nth:90): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:09 executing program 1: 07:35:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000005c0)={0x1e43, 0x2, 0xc0}) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfffffffffffffd79) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x8, &(0x7f00000006c0)=ANY=[@ANYBLOB="1825c90e5f093830878af6f48d80cd6737000000007e02000018000000cfc14c9f455b6588ad11fee1faa0471700080000000000080000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xffffffffffffffec, &(0x7f0000000140)=""/140, 0x41000, 0x0, [], r2, 0xd, r3, 0x8, &(0x7f0000000380)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xf, 0x0, 0x2}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={r3, r3, 0xc, 0x2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000680)={0x9f0000, 0x4, 0x100000001, [], &(0x7f0000000640)={0x9909da, 0x2, [], @value64=0x6}}) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockname$inet(r3, &(0x7f0000000740)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0xfffffffffffffda0) 07:35:09 executing program 5: 07:35:10 executing program 1: [ 516.673975][ T5372] FAULT_INJECTION: forcing a failure. [ 516.673975][ T5372] name failslab, interval 1, probability 0, space 0, times 0 07:35:10 executing program 5: [ 516.729519][ T5375] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 516.729519][ T5375] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 516.729519][ T5375] [ 516.770695][ T5372] CPU: 0 PID: 5372 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 516.779781][ T5372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.789823][ T5372] Call Trace: [ 516.793111][ T5372] dump_stack+0x172/0x1f0 [ 516.797434][ T5372] should_fail.cold+0xa/0x15 [ 516.802012][ T5372] ? fault_create_debugfs_attr+0x180/0x180 [ 516.807810][ T5372] ? page_to_nid.part.0+0x20/0x20 [ 516.812995][ T5372] ? ___might_sleep+0x163/0x280 [ 516.817829][ T5372] __should_failslab+0x121/0x190 [ 516.822754][ T5372] should_failslab+0x9/0x14 [ 516.827245][ T5372] kmem_cache_alloc_trace+0x2d3/0x790 [ 516.832601][ T5372] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 516.838393][ T5372] __memcg_init_list_lru_node+0x8a/0x1e0 [ 516.844007][ T5372] __list_lru_init+0x3fe/0x710 [ 516.848761][ T5372] alloc_super+0x762/0x890 [ 516.853168][ T5372] ? test_bdev_super_fc+0x80/0x80 [ 516.858175][ T5372] sget+0x117/0x560 [ 516.861969][ T5372] ? set_bdev_super_fc+0x210/0x210 [ 516.867073][ T5372] mount_bdev+0xff/0x3c0 [ 516.871316][ T5372] ? isofs_bread+0xe0/0xe0 [ 516.875720][ T5372] isofs_mount+0x35/0x40 [ 516.879957][ T5372] ? isofs_readpage+0x30/0x30 [ 516.884623][ T5372] legacy_get_tree+0x113/0x220 [ 516.889382][ T5372] ? ns_capable_common+0x93/0x100 [ 516.894391][ T5372] vfs_get_tree+0x8f/0x380 [ 516.898796][ T5372] do_mount+0x13b3/0x1c30 [ 516.903112][ T5372] ? copy_mount_string+0x40/0x40 [ 516.908037][ T5372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.914259][ T5372] ? copy_mount_options+0x2e8/0x3f0 [ 516.919455][ T5372] ksys_mount+0xdb/0x150 [ 516.923683][ T5372] __x64_sys_mount+0xbe/0x150 [ 516.928356][ T5372] do_syscall_64+0xfa/0x760 [ 516.932849][ T5372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.938723][ T5372] RIP: 0033:0x45c27a [ 516.942610][ T5372] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 516.962296][ T5372] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:35:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000004000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d3500000000000065070000020100a3d24b0e3f80a0e7001f75000000000000bf540000000000007aa1a71e14070400000400f9ffad0200000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x42202, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080)=0x200, r2, 0x0, 0x0, 0x1}}, 0x20) tee(r1, r0, 0x1000, 0x1) [ 516.970687][ T5372] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 516.978645][ T5372] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 516.986598][ T5372] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 516.994553][ T5372] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 517.002767][ T5372] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:10 executing program 1: 07:35:10 executing program 5: [ 517.049654][ T5375] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:10 executing program 4 (fault-call:0 fault-nth:91): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:10 executing program 1: 07:35:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x47, 0xffffffffffffffc3, &(0x7f0000000140)="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", 0x0}, 0xffffffffffffff6d) 07:35:10 executing program 5: 07:35:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:10 executing program 1: 07:35:10 executing program 5: 07:35:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="5c72d905c39ed0f8b7814ae0c7e954298650f5b6ef6ead296ac3152b3aa34d1114c2e7224ea6d38f7c6d62c1227dd33e532d0a2b33d086af157705e9ede7191ab265232a481b5e29e62637672227e4f246a37206383bb5da07b5fce77217507c3adf4d9a52666117704eb6ab3e07b98d7803ee33a9bfcbb5e9ad84bb77f857efdfd09d9cfc04626c677fa935a073b9bacae944993f95676ddf0579ccbdbaf6bccc99c90dda3b016f3947fbfb1e379db807af10e678d6c653cfe053d9459f373cbabd6c17c3c4b78357f98746f86f6db28bab1f336d355bb9e20a2b4a2d69941327795599", 0xe4, 0x6}, {&(0x7f0000000480)="fb38129dc2ae7c028c6b8d69c67541d275f75928d48881c8560055b5fb41b48aaf9439f9e3ed0925f6215b90fa5accb790bf917e47516130347a0315d1c4733079b506bf13c149179aff26dd1ce70cef179306eb70dca702fe59f0a437eca065061884482840cab0ab1c2e1a1ac4975c43ec89283b345b015c8607ea8576c57360505dc74c1de5635a6d111b355e3c13cc85c7aa7a9e4b7ed6774a90b9f7fd7e61cb6a6a242b386d4e39f5d629bdffdf837a4d5ef7a42211806d1ffdd452ddcd6cada400f389ce0e6edd987a274422cf666f4e43cbc44dcb2e3876f5f812942b548097bffb14c7e30ad7b9a2faf3f58167f470dd0f1e409b632d1a51cd4a5b280dbd392fa8860e125794d571131668296a41316a4016049191ed6d7a6177dc761cd301ac457140c62245b2c91f74d89be3100f80fc887fcf3b3e0ae45c5ec4ea36a6c78e1ce4d2baf9f7fa851c688911f5ab08910aa700c7596a7cd0646202dd428cab72ed8e84694a74f17e457eae6ec0535c69a49b1ad07449ec27d19b0e77242c41b3ae8c2a12f1cb333055498cf0ad039e6edb0f0507b20141a097a2c0fe354a5906fda8a976b2a7fef9a631fce66b48e4841c8a4f63b569981fbc50f56702ab5f40a49b172949bc22f9048a4fc43f84fd203ad2d66860d53fb0ea76face0d6d28dbbcceb28174ee042bdea69750a24cd7869eccb163df0e3a2609799c2a22daad2aa7f962d9daf9948831d3c328e5c7b4f5fb41501bed939644ab5b116447a2dfe971ef26ea0a68b3c14942cbb5bbbb0b3e6702de588ae7fc362019fb1f94527dc10ca8a8b33d719ac4c6678a0f179f3adab596396b1d02f676f6a285844a0748cb4086a98d32e6d34245a63477d59bb57ffb6e56da6aa02aedc0f9085e02f94c4056adc011f1cfd9e7819e539f37b6ab890410bc5e8df4e005f5c97906a6b4c2b13025279f07d9df5d88a491d8913b36cae2a5aaa7cfa24b36e5479702fff0910dc5e73bfa7fe483b2e353ad38548cd39b74ff9c73af51a6a870c9fdaf159d4c4a3e203630d671f0740f278ac753d517a37a074d89f8be7fbd22db25f81b0cb7fcb2d639ff9dd5e564e309591fa56f38a4cfca0ae347faf669da0ea030d68ac7a87eca4fbff9860dbe89cd2b77d395e5aaaebeba5423805dacd3de6e1f35537a07522ee5e8304489f729159a631304308ddf4c430be057c3680e229097cd50cfe261c3a89100f2730a8c5ecbf0c57c7189e145183b7aa06035ba221c504bd648fbf03b35791f1d6949619895eb6e117949c8d67dfc4ffcb3364646898945fe44c86dd7cbb656887afd6d7eda6eb2af45cc5830ec800a83a944c08a81d3643cae2358660ff51cc12091b494b557555c5936a9dfb7af446c0b554ef2cbd165953f82279e128e3fe382fcf1fdbaaab3b40b28594427e83217128816d025bf12addb154c237dff31f6b725ef1ec290410091d387013aef6935f4a1b5d8705bca04b0dc3fe6f4549f6af3fbf32ad3e0b5d4ab027a5433b0943837f835849b39e5fb71a17960402f4227ab3b536b2e106c0dda19d30491c5f76b6a9270c540bc3dc02fd78641261e0574e0f43bd24b765f8146cb24b1df952497371f669dc21392a465e279073023a32d62aa7785d8d80c5615affece94c0601c548a635db8293eecd385f17189bb6de9c17a9ed055a12980d9fa5ea743e8b84dfe709ff3022576fb7a865302bd1f66ddc6efeaf502566f1abca992af41799646aee18abdf2b850a19cb0e469f0a97e1e548df3a1910287111e4493e3fda0821fe877c56b03605e76653b4d81e32ec211759b2ca8a8b7fb4877bdbbf7cb4da17c2d9d6c8620c181d30d56bac2fcbad3ede8d8f56211c4e79e9f24dcdc59a3a5461264c4f0dae87d011eea23b185092284ac461fbf4cef0efd9feca8c7ea38edc1e5cd177863491d230a8def0c042f9adccf4d9cc9e5e52c7665fea291246d18fbddba02dc0221002729c4957470d81c3256c1ec911596a9774f14a1345c53a300da3588e5a50e2c875d68dee3b7c404e9137d9ffdc0cc2e6e79b3d2357d69123151d09d2e6822f1f8633abd073844db2c578acf6be3c8a1e7845bcb6c3d38bfc712801207464d2db816ace5c8286097ff900f7920a961cacaeb658762663fa632549ad37d2bd701ccd98b1c5e995328fc1d56f6a0dab50fa443be6c3901eeb26c553525ad7b0df4aa6ccf24caede70ec20ee23222dd751ddb09b63572724127df4237cac03376592621c6c3ef6a9987284204617e9a8d9c8929782e4a9ab821350cc317457f5e9ce912eb0f26c61c2fa5e7d4ecda09a549aef6918f2afb6d658f7e84250c25b0e9dd53a4e596e5c4d70cf6d0e5d6bcb7f5ac2aa419c8240511532a8b4588cafa911b19c975e1639e7a4f3c2da0b7f6111b06a0306c6fa9ae2f6e7b8443dfbafe8d5d4600f5f85382ddf2258da2e8a4c8a438c488ec9d9d5cdc134bbe28927f756d07cafd62fc8fe16621728a06eadf52a44267147b7988887deb8af36d3249e84d9e4fddd6111dd42967adf36b291e5558dac63833604752a0266dbd49f8c550b0892a96c12a5868cb785b402b2703eb28b053fe7e6544832ebda3989f24db2e17ba8cee20261cf05f7b6c36d95cc2bb87786bb5aac18fecb96f9f087065def90402c476f912795cca96d0386bbffc7ba713a7cee2da7468985c43535b0c9c8a795705b1548be4cf5a4d6773e636d10c4f890230803e3a8b0aea70bbc0bfbf3ab814964d569fd24789be994a4b9277d9f73007c2905f1a5160601d54a5040114342593903d709f448bffbc174e29c5e775f25ce8911a666c7ebbad2869a409a5efcefc59fc5d76b98f32d438503e2828edbd1b6c32be4f33e14057fb70abf80cd901ab45f7333e8d71916929f12dfe7856c7512212547a30057b384a21d44c104ebc1584406ba4237ff8b13c282cc1663835e5f602ff621830def96d47717531a33e5d38c7a6c6db83becc1db84985a5f8031f13508665c223b31640b30533c387610487144415b7e8d6c695a84a1aee9d47c131affa002cc91fccf5e6e7cdf02513e3cb99d0c1822ba63e75763982ba65820e3b24c6cc0bae9c8531331aad2b337150c51fead8c1b34defd23a5a4c5bc3e18cc498f058f37c9681b190caf114c20a1c17e8577b4af64735092eaeaa4bc32bb723ba38de04d30984e22473daaec4c996417f77de3e79758b92fe265cff51197216222162870cb9be1ac01a38ba430687904e955dca821e6df8b267bd1412793217b5a1e16efced15ad09ab2c8bd59cc7461b66d758222a08da32c69df14812440121dec88136cbb7dacfa7a22f6d033347f392e0c83aa269ff5827c319730b52d8b24f2f44c70db23a4f0231d34448e0f6246d5b8f2ad0a6826ad15b8c9e4e9a37e75b96b5de55930f8e6d9acb78c8de825b0863cca52460f81dead3f5a179126131dd53f040ce3fde9a51679974f1712f6140b72b871bd25e8ef6d535a39e26fa87afd6913153555f371954515e885885d6114d228a4ccfed718c4698286ad8fff15cbf14a73a9b9016cb3923a3c8dd0bae9e0838523a7c6b19f67f2937c6f91680ba03e929ea314b52bd601413e866c9b6f568ec45a60409ac38f430eb4bc818f069e6be2aa07213fdb37bf23aa6096f8854e56d6db80564d6ce93a17d3285596081d35613d053717f3c6b8cbf456c415f979857b30a030718f8d08fed886f650642c5c209929dd9ab51339d1a1e514a0cf1dda0d53037a3674e7a889a956af34a9f9d600a621bc857b7e1a948b3d2daa28c7f15ae9092bc3c50d4d3015dbfe182be2093ab9e92a869931b7634feb2d908f8b9d6ae0decf82820f75f9c9405c1b6c603dadf9d5b8564c1ba5d97a8253a3e9c67bf67f7e8fea95207f19820b90880d73e16425742b5d43e7d6cab0b3671cfb3dfebbbe6af11c998859fa6b10302d17baab6d5d76cb085c722b29b878c1901587bb73618bc6ba69f1923f69facffb90ee8e483c75894d49d4cb63b0862b16f6bb3dd055faaa0c2a8fe3f1ef1c9c4a86659b876f19b2ad7b17d576a147405d03fc04ccb9f635297dc3bbda6325c8e63c21fa5117125c32250b214957419befa640c48e0778b4f41686546174d3607ebed5fd98eebdd414f93d9502562dc855a21f8c08a123d4d8ff4a829bc8db5f4b86b0db5e0656a6164de7f42d634a4b27362875b35149eead02dac8e8286d76429373d80e361473cfb5af33ba87d8a2a2e11562dab8620c657bf4e58ab31df0d96d5524615fb07776c441e7fba76a31410e4a3e33ba24f609fa7341ee5be6d684f22a31fb9fbc549623132f99017e1644288a731d1a736faa65bfcc651c18213c8d7eaad0a8c77f385faf078ac4f2583100730733152b4c9211a3674211307530e2f805a17a1f0c06bfccca208fbfc7863b09eabf3f35cb42056dab51e642bf5bfd328e937fdeab510f8f14ea50dfb1283cbaf644b157bd1fc16819e5f5e8c0927e12237e8528b8803bd5ba0ed21bcbe5cd15acc92934fb30fe3355783aabb3d072d770c91de84bd89fb81676f29cf148b50c2c0c0e46d825a356d6ccb469aabf5382490edd2ee4a3b04cac7add3d1e35506d812b01b04ae8a75e28ed11270d4c9cb716090c74f777d3869970c7d0b829915eb00d6a7b843c740181fdc7a5725d231774e82cd4ab9f3ba1e681d9797766009f9522da6f3ed6a5a91cf8d96d8972b456387cf2d2d9abc61b8936e76fcc1b0309752a4f38a21468cec88986557a65b4f1e72cb730888079f86e2805785d707ed1a3c40c7b2ba59f19b73530cfecef40d66738260a3e27b4309763dab7d2c4d3b8a5f01f3699154291be7ee520cb5216cb0322ba3aa4f6f48cdbca6c10ffc74dabf279792f34d3102fc7991b7e56424b58ad1be2dbd26648d3a9f6bf7b08c7cc77a43abf4301c9ac5b82799cbb832d7abf5d432e5a88fd30c4902e1e404940f0180050778222fb3a14be214e4dabdd1b4e066fe8d5c544264c607f1ad98caf6c28cfc73ce14de6b25622524c171c4eda6cbcc6641091d214783ee54812cca875a8dac6320b81be69f49a0eff4fcc0ad9d89ddb374e2ef485e95394c18c007a981730f0deff385590bb964c44d8493960276ac4dac6af766640ca7ff3b79688afe3259151ad3a82f3bbd6ca0edbfd5f9ab0dd437051115eb8ceb2b8a357140579b3f381bb85b4a3d78095a37bfbe460438e895eb79e7ee8c45a2c83714d61dbc52e0e184e06ccb6aa5bdeed0ad151d2cf535d7c887535f49fda404758e304814c3607dc41ae2de7d3f43590397ec6f60a5b1b14096aa40148b135e3595dd3cfe861041e9adb7a4a555aba8606eed2b7631396857920125ec0e413803d1a2368e2c8172f94e416c3778bc49b2aceaa0f86dce1ddaf78c9ed9ec8cd14ef4d6fd15b0678bb0d3c363528eb44e34ee2d2203acea7a7f516bf41fb167f773c0d752c686b03af8b8236d642bec674bbdec8ad31be203d65c6770bdc2a2c5e2d0cf1da882034c5306ef32387e83e92156604c9a014db42760d3c7634ea4da04376320def3fd3b7a2bf37b6f7d5b79c263cc9c86bb220f65495317abf60b77d134816e769b8a8d88769b2d7a79cd3a2d8eba316cdbc5ab558d68746af1873e4555841c0b4632769e7b42ac51e470f810735d24567b37e3de68fd5e2187b5800481c33aaaea04b2a5a928ff6a307302b0414affa8aeb83ce594fc26ed72115169706a62063659d0fb4be03327e987d3f0e835c7eb18fd3fa0b775a6f9721728", 0x1000}], 0x210024, 0x0) [ 517.276056][ T5399] EXT4-fs (loop3): Mount option "nouser_xattr" will be removed by 3.5 [ 517.276056][ T5399] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 517.276056][ T5399] [ 517.298689][ T5403] FAULT_INJECTION: forcing a failure. [ 517.298689][ T5403] name failslab, interval 1, probability 0, space 0, times 0 [ 517.354551][ T5403] CPU: 1 PID: 5403 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 517.363633][ T5403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.365798][ T5399] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 517.373690][ T5403] Call Trace: [ 517.373729][ T5403] dump_stack+0x172/0x1f0 [ 517.373750][ T5403] should_fail.cold+0xa/0x15 [ 517.373765][ T5403] ? fault_create_debugfs_attr+0x180/0x180 [ 517.373785][ T5403] ? page_to_nid.part.0+0x20/0x20 [ 517.373799][ T5403] ? ___might_sleep+0x163/0x280 [ 517.373813][ T5403] __should_failslab+0x121/0x190 [ 517.373834][ T5403] should_failslab+0x9/0x14 [ 517.419638][ T5403] kmem_cache_alloc_trace+0x2d3/0x790 [ 517.419653][ T5403] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 517.419668][ T5403] __memcg_init_list_lru_node+0x8a/0x1e0 [ 517.419685][ T5403] __list_lru_init+0x3fe/0x710 [ 517.436466][ T5403] alloc_super+0x78d/0x890 [ 517.436485][ T5403] ? test_bdev_super_fc+0x80/0x80 [ 517.450663][ T5403] sget+0x117/0x560 [ 517.454486][ T5403] ? set_bdev_super_fc+0x210/0x210 [ 517.459603][ T5403] mount_bdev+0xff/0x3c0 [ 517.463858][ T5403] ? isofs_bread+0xe0/0xe0 [ 517.468279][ T5403] isofs_mount+0x35/0x40 [ 517.472529][ T5403] ? isofs_readpage+0x30/0x30 [ 517.477258][ T5403] legacy_get_tree+0x113/0x220 [ 517.482038][ T5403] ? ns_capable_common+0x93/0x100 [ 517.487077][ T5403] vfs_get_tree+0x8f/0x380 [ 517.491519][ T5403] do_mount+0x13b3/0x1c30 [ 517.495869][ T5403] ? copy_mount_string+0x40/0x40 [ 517.500813][ T5403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.507043][ T5403] ? copy_mount_options+0x2e8/0x3f0 [ 517.512229][ T5403] ksys_mount+0xdb/0x150 [ 517.516464][ T5403] __x64_sys_mount+0xbe/0x150 [ 517.521125][ T5403] do_syscall_64+0xfa/0x760 [ 517.525616][ T5403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.531494][ T5403] RIP: 0033:0x45c27a [ 517.535375][ T5403] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 07:35:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 517.554961][ T5403] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.563354][ T5403] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 517.571306][ T5403] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 517.579262][ T5403] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 517.587230][ T5403] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 517.595360][ T5403] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:10 executing program 1: 07:35:10 executing program 4 (fault-call:0 fault-nth:92): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:10 executing program 5: 07:35:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:11 executing program 5: 07:35:11 executing program 1: 07:35:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 517.810507][ T5427] FAULT_INJECTION: forcing a failure. [ 517.810507][ T5427] name failslab, interval 1, probability 0, space 0, times 0 [ 517.834990][ T5427] CPU: 1 PID: 5427 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 517.844074][ T5427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.854143][ T5427] Call Trace: [ 517.857455][ T5427] dump_stack+0x172/0x1f0 [ 517.861800][ T5427] should_fail.cold+0xa/0x15 [ 517.866399][ T5427] ? fault_create_debugfs_attr+0x180/0x180 [ 517.872217][ T5427] ? page_to_nid.part.0+0x20/0x20 [ 517.877254][ T5427] ? ___might_sleep+0x163/0x280 [ 517.882119][ T5427] __should_failslab+0x121/0x190 [ 517.887073][ T5427] should_failslab+0x9/0x14 [ 517.891582][ T5427] kmem_cache_alloc_trace+0x2d3/0x790 [ 517.896957][ T5427] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 517.904279][ T5427] __memcg_init_list_lru_node+0x8a/0x1e0 [ 517.909914][ T5427] __list_lru_init+0x3fe/0x710 [ 517.914683][ T5427] alloc_super+0x78d/0x890 [ 517.919103][ T5427] ? test_bdev_super_fc+0x80/0x80 [ 517.924133][ T5427] sget+0x117/0x560 [ 517.927951][ T5427] ? set_bdev_super_fc+0x210/0x210 [ 517.933061][ T5427] mount_bdev+0xff/0x3c0 [ 517.937304][ T5427] ? isofs_bread+0xe0/0xe0 [ 517.941722][ T5427] isofs_mount+0x35/0x40 [ 517.945973][ T5427] ? isofs_readpage+0x30/0x30 [ 517.950654][ T5427] legacy_get_tree+0x113/0x220 [ 517.955426][ T5427] ? ns_capable_common+0x93/0x100 [ 517.960461][ T5427] vfs_get_tree+0x8f/0x380 [ 517.964898][ T5427] do_mount+0x13b3/0x1c30 [ 517.969229][ T5427] ? copy_mount_string+0x40/0x40 [ 517.974180][ T5427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.980425][ T5427] ? copy_mount_options+0x2e8/0x3f0 [ 517.985634][ T5427] ksys_mount+0xdb/0x150 [ 517.989912][ T5427] __x64_sys_mount+0xbe/0x150 [ 517.994601][ T5427] do_syscall_64+0xfa/0x760 [ 517.999114][ T5427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.005020][ T5427] RIP: 0033:0x45c27a [ 518.008915][ T5427] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 518.028785][ T5427] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 518.037374][ T5427] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 518.045441][ T5427] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 518.053410][ T5427] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 07:35:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x8, 0xfa94, 0xfffffffffffffffe, 0xdb, 0x0, 0xffffffffffffffc1, 0x2, 0x5, 0x3, 0x3, 0x0, 0x200, 0x1, 0x4, 0x7fff, 0x6, 0x0, 0x7f, 0x2, 0x2f, 0x80000001, 0x80000000, 0x1, 0xea, 0x100, 0x7, 0x0, 0x100000000, 0x40, 0x62, 0x10001, 0x9, 0x3, 0xff, 0xfffffffffffffffc, 0x513, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x800}, 0x10000, 0x8, 0x5, 0x3, 0x200, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x120) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x4f1, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0xffffffc4) 07:35:11 executing program 5: 07:35:11 executing program 1: [ 518.061387][ T5427] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 518.069362][ T5427] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:11 executing program 4 (fault-call:0 fault-nth:93): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:11 executing program 5: 07:35:11 executing program 1: 07:35:11 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x50000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)=0x80000001) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:11 executing program 1: 07:35:11 executing program 5: 07:35:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x101000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:35:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 518.322938][ T5453] FAULT_INJECTION: forcing a failure. [ 518.322938][ T5453] name failslab, interval 1, probability 0, space 0, times 0 [ 518.369057][ T5453] CPU: 0 PID: 5453 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 518.378156][ T5453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.378164][ T5453] Call Trace: [ 518.378191][ T5453] dump_stack+0x172/0x1f0 [ 518.378216][ T5453] should_fail.cold+0xa/0x15 [ 518.400462][ T5453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.406706][ T5453] ? fault_create_debugfs_attr+0x180/0x180 [ 518.406725][ T5453] ? page_to_nid.part.0+0x20/0x20 [ 518.406745][ T5453] ? ___might_sleep+0x163/0x280 [ 518.422473][ T5453] __should_failslab+0x121/0x190 [ 518.427429][ T5453] should_failslab+0x9/0x14 [ 518.431938][ T5453] kmem_cache_alloc_node_trace+0x274/0x750 [ 518.437743][ T5453] ? kasan_kmalloc+0x9/0x10 [ 518.437760][ T5453] ? kmem_cache_alloc_trace+0x346/0x790 [ 518.447879][ T5453] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 518.453687][ T5453] __kmalloc_node+0x3d/0x70 [ 518.453706][ T5453] kvmalloc_node+0x68/0x100 [ 518.462691][ T5453] __list_lru_init+0x4d5/0x710 [ 518.467460][ T5453] alloc_super+0x78d/0x890 [ 518.467477][ T5453] ? test_bdev_super_fc+0x80/0x80 [ 518.476891][ T5453] sget+0x117/0x560 [ 518.480696][ T5453] ? set_bdev_super_fc+0x210/0x210 [ 518.480710][ T5453] mount_bdev+0xff/0x3c0 [ 518.480723][ T5453] ? isofs_bread+0xe0/0xe0 [ 518.480739][ T5453] isofs_mount+0x35/0x40 [ 518.490061][ T5453] ? isofs_readpage+0x30/0x30 [ 518.490077][ T5453] legacy_get_tree+0x113/0x220 [ 518.490097][ T5453] ? ns_capable_common+0x93/0x100 [ 518.498720][ T5453] vfs_get_tree+0x8f/0x380 [ 518.498739][ T5453] do_mount+0x13b3/0x1c30 [ 518.521862][ T5453] ? copy_mount_string+0x40/0x40 [ 518.526809][ T5453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.533049][ T5453] ? copy_mount_options+0x2e8/0x3f0 [ 518.538248][ T5453] ksys_mount+0xdb/0x150 [ 518.542491][ T5453] __x64_sys_mount+0xbe/0x150 [ 518.547168][ T5453] do_syscall_64+0xfa/0x760 [ 518.551675][ T5453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.557562][ T5453] RIP: 0033:0x45c27a [ 518.561460][ T5453] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 518.581321][ T5453] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 518.589735][ T5453] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 518.597705][ T5453] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 518.605672][ T5453] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 07:35:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:11 executing program 1: [ 518.613641][ T5453] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 518.621610][ T5453] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:12 executing program 4 (fault-call:0 fault-nth:94): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:12 executing program 5: 07:35:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:12 executing program 1: 07:35:12 executing program 5: 07:35:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:12 executing program 1: [ 518.836041][ T5474] FAULT_INJECTION: forcing a failure. [ 518.836041][ T5474] name failslab, interval 1, probability 0, space 0, times 0 [ 518.865590][ T5474] CPU: 0 PID: 5474 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 518.874674][ T5474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.884737][ T5474] Call Trace: [ 518.888043][ T5474] dump_stack+0x172/0x1f0 [ 518.892402][ T5474] should_fail.cold+0xa/0x15 [ 518.897001][ T5474] ? fault_create_debugfs_attr+0x180/0x180 [ 518.902814][ T5474] ? page_to_nid.part.0+0x20/0x20 [ 518.907843][ T5474] ? ___might_sleep+0x163/0x280 [ 518.912706][ T5474] __should_failslab+0x121/0x190 [ 518.917644][ T5474] should_failslab+0x9/0x14 [ 518.922237][ T5474] kmem_cache_alloc_trace+0x2d3/0x790 [ 518.927610][ T5474] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 518.933427][ T5474] __memcg_init_list_lru_node+0x8a/0x1e0 [ 518.939062][ T5474] __list_lru_init+0x3fe/0x710 [ 518.943829][ T5474] alloc_super+0x78d/0x890 [ 518.948251][ T5474] ? test_bdev_super_fc+0x80/0x80 [ 518.953299][ T5474] sget+0x117/0x560 [ 518.957105][ T5474] ? set_bdev_super_fc+0x210/0x210 [ 518.962218][ T5474] mount_bdev+0xff/0x3c0 [ 518.966457][ T5474] ? isofs_bread+0xe0/0xe0 [ 518.970878][ T5474] isofs_mount+0x35/0x40 [ 518.975121][ T5474] ? isofs_readpage+0x30/0x30 [ 518.979818][ T5474] legacy_get_tree+0x113/0x220 [ 518.984591][ T5474] ? ns_capable_common+0x93/0x100 [ 518.989619][ T5474] vfs_get_tree+0x8f/0x380 [ 518.994035][ T5474] do_mount+0x13b3/0x1c30 [ 518.998365][ T5474] ? copy_mount_string+0x40/0x40 [ 519.003400][ T5474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.009734][ T5474] ? copy_mount_options+0x2e8/0x3f0 [ 519.014939][ T5474] ksys_mount+0xdb/0x150 [ 519.019185][ T5474] __x64_sys_mount+0xbe/0x150 [ 519.023869][ T5474] do_syscall_64+0xfa/0x760 [ 519.028378][ T5474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.034273][ T5474] RIP: 0033:0x45c27a [ 519.038347][ T5474] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 519.058122][ T5474] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 519.066534][ T5474] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 519.074515][ T5474] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 07:35:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000800000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf670000000000005706000007006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe}, 0x10}, 0xfffffdb4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:12 executing program 5: 07:35:12 executing program 1: [ 519.082487][ T5474] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 519.090465][ T5474] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 519.098436][ T5474] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:12 executing program 4 (fault-call:0 fault-nth:95): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:12 executing program 5: 07:35:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x2, 0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:12 executing program 1: 07:35:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair(0x9, 0xb, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001980)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0xe4, 0x0, 0xfffffffffffffe77, 0x0, 0xdf4c55cf8aa0f2fb}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='bpuset.efCK\x97\xa6\xf7\xcf\xe8cN(+\n4fuctive_mms\xfd\xff\xff\xff\x97\x80\xa9\xff', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r2, 0x1f}, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="b74c4cbf961e0c8e7d02e13f19f0", 0x0, 0x54e6}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x20, 0x5, 0xffff, 0xfffffffffffffffd}, {0x1, 0x2, 0x3, 0x282}, {0xfff, 0xfffffffffffffffa, 0x7b, 0x2}, {0x1, 0x7, 0xfffffffffffffff8, 0x8}, {0x8, 0x400080, 0x1, 0x100}]}) 07:35:12 executing program 5: 07:35:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:12 executing program 1: 07:35:12 executing program 5: 07:35:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) [ 519.400210][ T5496] FAULT_INJECTION: forcing a failure. [ 519.400210][ T5496] name failslab, interval 1, probability 0, space 0, times 0 [ 519.459066][ T5496] CPU: 1 PID: 5496 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 519.468490][ T5496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.478819][ T5496] Call Trace: [ 519.482138][ T5496] dump_stack+0x172/0x1f0 [ 519.486518][ T5496] should_fail.cold+0xa/0x15 [ 519.491223][ T5496] ? fault_create_debugfs_attr+0x180/0x180 [ 519.497224][ T5496] ? page_to_nid.part.0+0x20/0x20 [ 519.502354][ T5496] ? ___might_sleep+0x163/0x280 [ 519.507221][ T5496] __should_failslab+0x121/0x190 [ 519.512175][ T5496] should_failslab+0x9/0x14 [ 519.516865][ T5496] kmem_cache_alloc_trace+0x2d3/0x790 [ 519.522507][ T5496] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 519.528332][ T5496] __memcg_init_list_lru_node+0x8a/0x1e0 [ 519.533985][ T5496] __list_lru_init+0x3fe/0x710 [ 519.538755][ T5496] alloc_super+0x78d/0x890 [ 519.538771][ T5496] ? test_bdev_super_fc+0x80/0x80 [ 519.538784][ T5496] sget+0x117/0x560 [ 519.538802][ T5496] ? set_bdev_super_fc+0x210/0x210 [ 519.557131][ T5496] mount_bdev+0xff/0x3c0 [ 519.561376][ T5496] ? isofs_bread+0xe0/0xe0 [ 519.565810][ T5496] isofs_mount+0x35/0x40 [ 519.570058][ T5496] ? isofs_readpage+0x30/0x30 [ 519.574822][ T5496] legacy_get_tree+0x113/0x220 [ 519.579599][ T5496] ? ns_capable_common+0x93/0x100 [ 519.585765][ T5496] vfs_get_tree+0x8f/0x380 [ 519.590194][ T5496] do_mount+0x13b3/0x1c30 [ 519.590212][ T5496] ? copy_mount_string+0x40/0x40 [ 519.590230][ T5496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.590241][ T5496] ? copy_mount_options+0x2e8/0x3f0 [ 519.590255][ T5496] ksys_mount+0xdb/0x150 [ 519.590271][ T5496] __x64_sys_mount+0xbe/0x150 [ 519.605754][ T5496] do_syscall_64+0xfa/0x760 [ 519.605775][ T5496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.605791][ T5496] RIP: 0033:0x45c27a [ 519.634152][ T5496] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 519.653971][ T5496] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 519.662394][ T5496] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 519.670377][ T5496] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 519.678435][ T5496] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 519.686391][ T5496] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 519.694444][ T5496] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:13 executing program 4 (fault-call:0 fault-nth:96): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:13 executing program 1: 07:35:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:13 executing program 5: 07:35:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:13 executing program 1: 07:35:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c0000002000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006617000002000000070700004c0000001f75000000000000bf54000000000000070400000000f9ffad5745d4e9d262574301000000000095000000000095000000000000007504f4b0ab0506623d4656ca703d343a13a3716c9c74c28cb26809e9d9a32baad459fbd5c84b9a4fdebecc3015e86a16f0fa0eff1d77f3b67a15ab630264b3"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:13 executing program 5: 07:35:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 519.894698][ T5521] FAULT_INJECTION: forcing a failure. [ 519.894698][ T5521] name failslab, interval 1, probability 0, space 0, times 0 [ 519.903474][ T5518] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 519.941791][ T5521] CPU: 0 PID: 5521 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 519.950889][ T5521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.960963][ T5521] Call Trace: [ 519.964280][ T5521] dump_stack+0x172/0x1f0 [ 519.968641][ T5521] should_fail.cold+0xa/0x15 [ 519.973253][ T5521] ? fault_create_debugfs_attr+0x180/0x180 [ 519.979099][ T5521] ? page_to_nid.part.0+0x20/0x20 [ 519.984154][ T5521] ? ___might_sleep+0x163/0x280 [ 519.989026][ T5521] __should_failslab+0x121/0x190 [ 519.993973][ T5521] should_failslab+0x9/0x14 [ 519.998485][ T5521] kmem_cache_alloc_trace+0x2d3/0x790 [ 520.003872][ T5521] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 520.009690][ T5521] __memcg_init_list_lru_node+0x8a/0x1e0 [ 520.015332][ T5521] __list_lru_init+0x3fe/0x710 [ 520.020208][ T5521] alloc_super+0x78d/0x890 [ 520.024977][ T5521] ? test_bdev_super_fc+0x80/0x80 [ 520.030104][ T5521] sget+0x117/0x560 [ 520.034007][ T5521] ? set_bdev_super_fc+0x210/0x210 [ 520.039138][ T5521] mount_bdev+0xff/0x3c0 [ 520.043435][ T5521] ? isofs_bread+0xe0/0xe0 [ 520.047866][ T5521] isofs_mount+0x35/0x40 [ 520.052378][ T5521] ? isofs_readpage+0x30/0x30 [ 520.057084][ T5521] legacy_get_tree+0x113/0x220 [ 520.062732][ T5521] ? ns_capable_common+0x93/0x100 [ 520.068303][ T5521] vfs_get_tree+0x8f/0x380 [ 520.072728][ T5521] do_mount+0x13b3/0x1c30 [ 520.077346][ T5521] ? copy_mount_string+0x40/0x40 [ 520.082294][ T5521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.088540][ T5521] ? _copy_from_user+0x12c/0x1a0 [ 520.093487][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.099823][ T5521] ? copy_mount_options+0x2e8/0x3f0 [ 520.105032][ T5521] ksys_mount+0xdb/0x150 [ 520.109286][ T5521] __x64_sys_mount+0xbe/0x150 [ 520.113975][ T5521] do_syscall_64+0xfa/0x760 [ 520.118497][ T5521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.124393][ T5521] RIP: 0033:0x45c27a [ 520.128298][ T5521] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.148171][ T5521] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.156597][ T5521] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 520.164575][ T5521] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 520.172550][ T5521] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 520.180531][ T5521] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:35:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:35:13 executing program 1: 07:35:13 executing program 5: [ 520.188595][ T5521] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:13 executing program 4 (fault-call:0 fault-nth:97): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:35:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x10001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="9cb2275809d2c09619844bced84a", 0x0}, 0x182) 07:35:13 executing program 5: 07:35:13 executing program 1: 07:35:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff0700670600000200b4b00000070600000ee60000bf250000000000e8b6350000000000006507000002000000070700004c0000001f75000000000000bf5400000000f900070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000200)=0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x158d, 0x200000) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) 07:35:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:35:13 executing program 5: [ 520.389554][ T5537] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:13 executing program 1: [ 520.474408][ T5544] FAULT_INJECTION: forcing a failure. [ 520.474408][ T5544] name failslab, interval 1, probability 0, space 0, times 0 [ 520.489628][ T5544] CPU: 1 PID: 5544 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 520.498692][ T5544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.508749][ T5544] Call Trace: [ 520.508777][ T5544] dump_stack+0x172/0x1f0 [ 520.508800][ T5544] should_fail.cold+0xa/0x15 [ 520.520985][ T5544] ? fault_create_debugfs_attr+0x180/0x180 [ 520.526801][ T5544] ? page_to_nid.part.0+0x20/0x20 [ 520.526822][ T5544] ? ___might_sleep+0x163/0x280 [ 520.536678][ T5544] __should_failslab+0x121/0x190 [ 520.541624][ T5544] should_failslab+0x9/0x14 [ 520.546135][ T5544] kmem_cache_alloc_trace+0x2d3/0x790 [ 520.551522][ T5544] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 520.557329][ T5544] __memcg_init_list_lru_node+0x8a/0x1e0 [ 520.557341][ T5544] __list_lru_init+0x3fe/0x710 [ 520.557362][ T5544] alloc_super+0x78d/0x890 [ 520.567755][ T5544] ? test_bdev_super_fc+0x80/0x80 [ 520.567771][ T5544] sget+0x117/0x560 [ 520.580983][ T5544] ? set_bdev_super_fc+0x210/0x210 [ 520.586110][ T5544] mount_bdev+0xff/0x3c0 [ 520.590368][ T5544] ? isofs_bread+0xe0/0xe0 [ 520.590380][ T5544] isofs_mount+0x35/0x40 [ 520.590391][ T5544] ? isofs_readpage+0x30/0x30 [ 520.590407][ T5544] legacy_get_tree+0x113/0x220 [ 520.590421][ T5544] ? ns_capable_common+0x93/0x100 [ 520.590439][ T5544] vfs_get_tree+0x8f/0x380 [ 520.599066][ T5544] do_mount+0x13b3/0x1c30 [ 520.599084][ T5544] ? copy_mount_string+0x40/0x40 [ 520.627182][ T5544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.633427][ T5544] ? copy_mount_options+0x2e8/0x3f0 [ 520.638626][ T5544] ksys_mount+0xdb/0x150 [ 520.642874][ T5544] __x64_sys_mount+0xbe/0x150 [ 520.647572][ T5544] do_syscall_64+0xfa/0x760 [ 520.652090][ T5544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.657994][ T5544] RIP: 0033:0x45c27a [ 520.658012][ T5544] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.681487][ T5544] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.681501][ T5544] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 520.681507][ T5544] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 520.681514][ T5544] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 520.681520][ T5544] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 07:35:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 520.681527][ T5544] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:14 executing program 4 (fault-call:0 fault-nth:98): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:14 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unshare(0x2000000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x2a6) r2 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r2, 0x6b, 0x66}, &(0x7f0000000180)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613500322d61726252e63f24d5ba038736dcab6d3634002a00"/77], &(0x7f0000000340)="1b75dcb9172a1e7f2e816c6fb274199ba42e16ddf9819f90470ee3e1c064e3e71b19ba77d9cd6b8eb4740169562c5c23316a1051be26e9363d79b5153952140aded6bf3012cb7364a3c56309013e32dba00a3af80d39ecc954fe7d5973176446b282217b48610a910295c0", &(0x7f00000003c0)="be732b94ff9804ccf718d9a5d16c74290890899d883074c8eef3fdeb9f60e4e8c292b4bbff3ac4998610acbfc6a3add6300d68be10461a130a750760e0b6efe2a948f5974c2d046c7f8218efc98be36359e9892132fda0fc7e4322cef9379394eb30c07b1deb") ioctl$PPPIOCDISCONN(r0, 0x7439) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x1, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES64=r2, @ANYRES64=r1, @ANYRESDEC=r0, @ANYRESOCT=r1]], &(0x7f0000000500)='GPL\x00', 0x8000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x8000000000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x402000, 0x0) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000480)) 07:35:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:14 executing program 5: 07:35:14 executing program 1: [ 520.772805][ T5554] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:14 executing program 5: 07:35:14 executing program 1: 07:35:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706400002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) [ 520.905546][ T5567] FAULT_INJECTION: forcing a failure. [ 520.905546][ T5567] name failslab, interval 1, probability 0, space 0, times 0 07:35:14 executing program 5: 07:35:14 executing program 1: [ 520.953775][ T5572] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 520.982075][ T5567] CPU: 0 PID: 5567 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 520.991507][ T5567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.001571][ T5567] Call Trace: [ 521.005179][ T5567] dump_stack+0x172/0x1f0 [ 521.009538][ T5567] should_fail.cold+0xa/0x15 [ 521.014250][ T5567] ? fault_create_debugfs_attr+0x180/0x180 [ 521.020433][ T5567] ? page_to_nid.part.0+0x20/0x20 [ 521.025826][ T5567] ? ___might_sleep+0x163/0x280 [ 521.030695][ T5567] __should_failslab+0x121/0x190 [ 521.035640][ T5567] should_failslab+0x9/0x14 [ 521.040324][ T5567] kmem_cache_alloc_trace+0x2d3/0x790 [ 521.045697][ T5567] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 521.051595][ T5567] __memcg_init_list_lru_node+0x8a/0x1e0 [ 521.057232][ T5567] __list_lru_init+0x3fe/0x710 [ 521.062004][ T5567] alloc_super+0x78d/0x890 [ 521.066422][ T5567] ? test_bdev_super_fc+0x80/0x80 [ 521.071450][ T5567] sget+0x117/0x560 [ 521.075258][ T5567] ? set_bdev_super_fc+0x210/0x210 [ 521.080372][ T5567] mount_bdev+0xff/0x3c0 [ 521.084631][ T5567] ? isofs_bread+0xe0/0xe0 [ 521.089050][ T5567] isofs_mount+0x35/0x40 [ 521.093382][ T5567] ? isofs_readpage+0x30/0x30 [ 521.098076][ T5567] legacy_get_tree+0x113/0x220 [ 521.102843][ T5567] ? ns_capable_common+0x93/0x100 [ 521.107867][ T5567] vfs_get_tree+0x8f/0x380 [ 521.112286][ T5567] do_mount+0x13b3/0x1c30 [ 521.116727][ T5567] ? copy_mount_string+0x40/0x40 [ 521.121682][ T5567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.128397][ T5567] ? copy_mount_options+0x2e8/0x3f0 [ 521.133602][ T5567] ksys_mount+0xdb/0x150 [ 521.137944][ T5567] __x64_sys_mount+0xbe/0x150 [ 521.142638][ T5567] do_syscall_64+0xfa/0x760 [ 521.147146][ T5567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.153040][ T5567] RIP: 0033:0x45c27a [ 521.156940][ T5567] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 521.176548][ T5567] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 521.185073][ T5567] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 521.193073][ T5567] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 521.201045][ T5567] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 521.209020][ T5567] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 521.216988][ T5567] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:14 executing program 4 (fault-call:0 fault-nth:99): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:14 executing program 1: 07:35:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:35:14 executing program 5: 07:35:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:14 executing program 1: 07:35:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:35:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6a, 0x10000) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "5e0c2ab9d0bdebfb", "fbd22fdf79ff37578db89018d3bf39ff", "486de125", "2f23b3975c63a827"}, 0x28) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000140)={{0xffff, 0x3, 0x0, 0x101, 0x2, 0x784}, 0x8000}) 07:35:14 executing program 5: [ 521.389694][ T5586] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:14 executing program 1: 07:35:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:35:14 executing program 5: [ 521.469119][ T5591] FAULT_INJECTION: forcing a failure. [ 521.469119][ T5591] name failslab, interval 1, probability 0, space 0, times 0 [ 521.540057][ T5591] CPU: 0 PID: 5591 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190805 #59 [ 521.549130][ T5591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.559316][ T5591] Call Trace: [ 521.562610][ T5591] dump_stack+0x172/0x1f0 [ 521.566932][ T5591] should_fail.cold+0xa/0x15 [ 521.571508][ T5591] ? fault_create_debugfs_attr+0x180/0x180 [ 521.577304][ T5591] ? page_to_nid.part.0+0x20/0x20 [ 521.582576][ T5591] ? ___might_sleep+0x163/0x280 [ 521.587436][ T5591] __should_failslab+0x121/0x190 [ 521.592383][ T5591] should_failslab+0x9/0x14 [ 521.597045][ T5591] kmem_cache_alloc_trace+0x2d3/0x790 [ 521.602418][ T5591] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 521.608225][ T5591] __memcg_init_list_lru_node+0x8a/0x1e0 [ 521.613863][ T5591] __list_lru_init+0x3fe/0x710 [ 521.618625][ T5591] alloc_super+0x78d/0x890 [ 521.623122][ T5591] ? test_bdev_super_fc+0x80/0x80 [ 521.628134][ T5591] sget+0x117/0x560 [ 521.631927][ T5591] ? set_bdev_super_fc+0x210/0x210 [ 521.637033][ T5591] mount_bdev+0xff/0x3c0 [ 521.641260][ T5591] ? isofs_bread+0xe0/0xe0 [ 521.646360][ T5591] isofs_mount+0x35/0x40 [ 521.650589][ T5591] ? isofs_readpage+0x30/0x30 [ 521.655255][ T5591] legacy_get_tree+0x113/0x220 [ 521.660008][ T5591] ? ns_capable_common+0x93/0x100 [ 521.665020][ T5591] vfs_get_tree+0x8f/0x380 [ 521.669427][ T5591] do_mount+0x13b3/0x1c30 [ 521.673744][ T5591] ? copy_mount_string+0x40/0x40 [ 521.678674][ T5591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.684899][ T5591] ? copy_mount_options+0x2e8/0x3f0 [ 521.690197][ T5591] ksys_mount+0xdb/0x150 [ 521.694530][ T5591] __x64_sys_mount+0xbe/0x150 [ 521.699289][ T5591] do_syscall_64+0xfa/0x760 [ 521.703783][ T5591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.709686][ T5591] RIP: 0033:0x45c27a [ 521.713566][ T5591] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 521.734763][ T5591] RSP: 002b:00007fd42d531a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 521.743718][ T5591] RAX: ffffffffffffffda RBX: 00007fd42d531b40 RCX: 000000000045c27a [ 521.751673][ T5591] RDX: 00007fd42d531ae0 RSI: 0000000020000040 RDI: 00007fd42d531b00 [ 521.759723][ T5591] RBP: 0000000000000000 R08: 00007fd42d531b40 R09: 00007fd42d531ae0 [ 521.767680][ T5591] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 521.775731][ T5591] R13: 00000000004c89d3 R14: 00000000004df7f8 R15: 0000000000000003 07:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:15 executing program 1: 07:35:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xff, 0x80) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x20004000) 07:35:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) 07:35:15 executing program 5: 07:35:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x8000000000049) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00516) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup2(r1, r2) readv(r3, &(0x7f0000002700)=[{&(0x7f0000000100)=""/169, 0xa9}, {0x0}, {0x0}, {0x0, 0xfffffdef}, {0x0}], 0x5) shutdown(r2, 0x0) 07:35:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) 07:35:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x1dc, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe33}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x6e, @mcast2, 0xfffffffffffffffd}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9c}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x79b}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 521.896519][ T5603] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) [ 522.015587][ T5613] ISOFS: Unable to identify CD-ROM format. 07:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='%so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000140)=0x9, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) mlockall(0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000080)={0x2, "3f80eddf9a2efebf3d5a3100f01598b9e6056e26e5e063d84902f3ec66163d4a", 0x2}) [ 522.097951][ T5628] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x7, 0x0, &(0x7f0000000000)="743d7d516f5b0e", 0x0}, 0x28) 07:35:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff0000aea3, 0x0) 07:35:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x7, 0x0, &(0x7f0000000000)="743d7d516f5b0e", 0x0}, 0x28) 07:35:15 executing program 1: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="2ccc0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0x1f6}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="4e13473b89fbc45cf6e43c476c0937d1f72e54cff2ab3e002db95212b9e7236a506d02d973b73c956991d30db9adc280ecc37d8563a314037854942c981f125c9b9cb8333854deac7366a73846ee3cd44315a2c92f4d9ec3f47367c8c650aceccc3e35cc45b1a9cc7e2778d9fed05451a5549dfc5d73bfecc558d4eeb7e220f28bf1925b84f9e32c", @ANYRES32, @ANYBLOB="afabe794fb8e7584e626469620602b523baf8406cb1af9c32be46a919c55d60b1a7a72af979e30fd0baaac5b48410d94d9e2e6294e6ab4210c9db1ef09a7f0f07e51"], 0x0, 0xce}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 522.259317][ T5644] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='\\so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x7, 0x0, &(0x7f0000000000)="743d7d516f5b0e", 0x0}, 0x28) 07:35:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i#o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair(0x9, 0xb, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001980)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0xe4, 0x0, 0xfffffffffffffe77, 0x0, 0xdf4c55cf8aa0f2fb}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='bpuset.efCK\x97\xa6\xf7\xcf\xe8cN(+\n4fuctive_mms\xfd\xff\xff\xff\x97\x80\xa9\xff', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r2, 0x1f}, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="b74c4cbf961e0c8e7d02e13f19f0", 0x0, 0x54e6}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x20, 0x5, 0xffff, 0xfffffffffffffffd}, {0x1, 0x2, 0x3, 0x282}, {0xfff, 0xfffffffffffffffa, 0x7b, 0x2}, {0x1, 0x7, 0xfffffffffffffff8, 0x8}, {0x8, 0x400080, 0x1, 0x100}]}) 07:35:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x1, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000001580)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES64, @ANYRES32, @ANYRES16, @ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYRESOCT, @ANYBLOB="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", @ANYRES32], @ANYRESHEX, @ANYRES32=0x0, @ANYRESHEX=0x0]], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x7, 0xfffffffffffffffc}, 0x10}, 0x70) r1 = dup3(r0, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xb, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148", 0x0}, 0x28) [ 525.096189][ T5663] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f750292c80ed14bd4ac000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500008000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x5, 0x0, &(0x7f0000000480)="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", 0x0}, 0x78) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x9, 0x42) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000080)={0x81, 0x24, [0x80000001, 0x400, 0x8001, 0xfffffffffffffffb, 0x0, 0xffffffff, 0x9, 0x9, 0x6]}) 07:35:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i%o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xb, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148", 0x0}, 0x28) [ 525.346387][ T5695] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @ioapic={0x6000, 0x2, 0x8, 0x9, 0x0, [{0x0, 0x1, 0xbed, [], 0x9}, {0x10001, 0xffffffff, 0x8}, {0x4, 0x10000, 0x2, [], 0x80000000}, {0x6, 0x3, 0x2, [], 0x9}, {0x5, 0x0, 0x6e, [], 0x5}, {0x3, 0x0, 0x9, [], 0x9}, {0x100, 0x8, 0x4, [], 0x1a}, {0x0, 0x3f, 0x5, [], 0xf}, {0x9, 0x0, 0x20, [], 0x2}, {0xffff, 0x5, 0x4, [], 0x1}, {0x1000, 0x0, 0x6, [], 0x7}, {0x3, 0x1000, 0x0, [], 0x3f}, {0x0, 0x0, 0x1, [], 0x7ff}, {0x5, 0x3ff, 0x1, [], 0x5}, {0x6, 0x8, 0x0, [], 0xfff}, {0x9, 0x1b44b065, 0x10000, [], 0x8}, {0x8, 0x0, 0x6, [], 0xfffffffffffffffa}, {0x8, 0xa7, 0x4, [], 0xffffffffffffffff}, {0x101, 0x2, 0x7, [], 0x40}, {0x9, 0x9, 0x1c, [], 0x4}, {0xfffffffffffffff8, 0x1, 0x80, [], 0x1}, {0x6, 0x2, 0x6, [], 0x20}, {0x3, 0x9, 0x7, [], 0x2}, {0xffffffff, 0x10001, 0x9, [], 0xb0b}]}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xb, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148", 0x0}, 0x28) 07:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i*o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair(0x9, 0xb, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001980)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0xe4, 0x0, 0xfffffffffffffe77, 0x0, 0xdf4c55cf8aa0f2fb}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='bpuset.efCK\x97\xa6\xf7\xcf\xe8cN(+\n4fuctive_mms\xfd\xff\xff\xff\x97\x80\xa9\xff', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r2, 0x1f}, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="b74c4cbf961e0c8e7d02e13f19f0", 0x0, 0x54e6}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x20, 0x5, 0xffff, 0xfffffffffffffffd}, {0x1, 0x2, 0x3, 0x282}, {0xfff, 0xfffffffffffffffa, 0x7b, 0x2}, {0x1, 0x7, 0xfffffffffffffff8, 0x8}, {0x8, 0x400080, 0x1, 0x100}]}) 07:35:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xd, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a", 0x0}, 0x28) 07:35:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) connect$bt_sco(r1, &(0x7f0000000400)={0x1f, {0x4, 0x7fff, 0x5, 0x5, 0x4, 0x6}}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f00000001c0)=[{&(0x7f0000000140)="f7ccaaffe73b3973e510c18abb0e26277beacbb65c28d8978e028017b75796f7eca1b5fd351ecad7d21a37a67f798d594030fda42aa39386b8bc562bc8c29ed32b26876e1a70", 0x46, 0x70ccdeb1}, {&(0x7f0000000340)="d31e1196dcb2495250d55d68144b32dec5c4784e1b52f288dd7bd293c6dbfd0d5c6f61573d5e0f598fca7b7f967bac09b2648086264279a9bf6b96b331e7f838785005e94935ecdad229291089a7a35d3958e0eeccd13ca86a3714fb7b774624a5176516391b1f18cc40a03968e3a3d0e7471f0171bc806c32d192d358f7853584fcf12bbf", 0x85, 0x3}, {&(0x7f0000000480)="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", 0x1000, 0x8000}, {&(0x7f0000001480)="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", 0x1000, 0x6}, {&(0x7f0000002480)="2ee7b1f1c0af4df3f4880a985cd1278f1d730106cbe726335378b1b5a461596b248f8021929d575221ef1e7370a6f30389cd379acd5f05f0804bc3b188244e32724700f7e710ba05c42f4049a12ff97f675742e6c38d29db044add26f6a187402141f561a8b4e28296827db38471c1e1c5a7aef24cc1fa5bde6249b337af94abac201fdb98fcc5ba98c2e1ecbfb80006122fe591c4b64317f31b6638008b5df1c95c5f3bddc850a099bc277fc411ddf4574a9aa9387adbb8f15e9b7f692383582fcfbccc5b9511748a651eb305", 0xcd, 0x7f}], 0x2000, &(0x7f0000002580)={[{@inode64='inode64'}, {@nogrpid='nogrpid'}, {@pquota='pquota'}], [{@subj_user={'subj_user', 0x3d, 'nodevsystem%!{nodevmd5sumsystem'}}, {@subj_role={'subj_role', 0x3d, 'ð0userppp1+vmnet1{,*'}}, {@obj_user={'obj_user', 0x3d, 'GPL\x00'}}, {@fsname={'fsname', 0x3d, 'GPL\x00'}}, {@hash='hash'}, {@fsname={'fsname', 0x3d, '^-locgroup'}}]}) [ 528.153473][ T5706] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xd, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a", 0x0}, 0x28) 07:35:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i+o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xd, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a", 0x0}, 0x28) [ 528.446257][ T5730] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x10, 0x4}, 0xffffffffffffff84}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x9, 0x9}, 'port0\x00', 0x40, 0x10000, 0x401, 0x5, 0xffffffff, 0x4, 0x0, 0x0, 0x0, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d000000000095000000000000007926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f90008430100000000009500000000000000050000000000000095000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000200), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) connect$bt_sco(r1, &(0x7f0000000400)={0x1f, {0x4, 0x7fff, 0x5, 0x5, 0x4, 0x6}}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f00000001c0)=[{&(0x7f0000000140)="f7ccaaffe73b3973e510c18abb0e26277beacbb65c28d8978e028017b75796f7eca1b5fd351ecad7d21a37a67f798d594030fda42aa39386b8bc562bc8c29ed32b26876e1a70", 0x46, 0x70ccdeb1}, {&(0x7f0000000340)="d31e1196dcb2495250d55d68144b32dec5c4784e1b52f288dd7bd293c6dbfd0d5c6f61573d5e0f598fca7b7f967bac09b2648086264279a9bf6b96b331e7f838785005e94935ecdad229291089a7a35d3958e0eeccd13ca86a3714fb7b774624a5176516391b1f18cc40a03968e3a3d0e7471f0171bc806c32d192d358f7853584fcf12bbf", 0x85, 0x3}, {&(0x7f0000000480)="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", 0x1000, 0x8000}, {&(0x7f0000001480)="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", 0x1000, 0x6}, {&(0x7f0000002480)="2ee7b1f1c0af4df3f4880a985cd1278f1d730106cbe726335378b1b5a461596b248f8021929d575221ef1e7370a6f30389cd379acd5f05f0804bc3b188244e32724700f7e710ba05c42f4049a12ff97f675742e6c38d29db044add26f6a187402141f561a8b4e28296827db38471c1e1c5a7aef24cc1fa5bde6249b337af94abac201fdb98fcc5ba98c2e1ecbfb80006122fe591c4b64317f31b6638008b5df1c95c5f3bddc850a099bc277fc411ddf4574a9aa9387adbb8f15e9b7f692383582fcfbccc5b9511748a651eb305", 0xcd, 0x7f}], 0x2000, &(0x7f0000002580)={[{@inode64='inode64'}, {@nogrpid='nogrpid'}, {@pquota='pquota'}], [{@subj_user={'subj_user', 0x3d, 'nodevsystem%!{nodevmd5sumsystem'}}, {@subj_role={'subj_role', 0x3d, 'ð0userppp1+vmnet1{,*'}}, {@obj_user={'obj_user', 0x3d, 'GPL\x00'}}, {@fsname={'fsname', 0x3d, 'GPL\x00'}}, {@hash='hash'}, {@fsname={'fsname', 0x3d, '^-locgroup'}}]}) 07:35:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1b", 0x1d, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i-o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = dup2(r0, r0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x527, 0x0, 0x0, 0x0, 0x49d8}, [@jmp={0x5, 0x3, 0x7, 0x5, 0x2, 0xffffffffffffffff, 0x1}, @map={0x18, 0xd, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0xffffffffffff379a, 0x41, &(0x7f0000000140)=""/65, 0x41100, 0x2, [], r2, 0xf, r3, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xf}, 0x10}, 0x70) [ 531.172592][ T5749] Unknown ioctl 1084773153 07:35:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = dup2(r0, r0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x527, 0x0, 0x0, 0x0, 0x49d8}, [@jmp={0x5, 0x3, 0x7, 0x5, 0x2, 0xffffffffffffffff, 0x1}, @map={0x18, 0xd, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0xffffffffffff379a, 0x41, &(0x7f0000000140)=""/65, 0x41100, 0x2, [], r2, 0xf, r3, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xf}, 0x10}, 0x70) 07:35:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff0700670600000200000007000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000050000000000000095000000000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 531.206414][ T5752] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 531.209583][ T5749] Unknown ioctl 1084773153 07:35:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = dup2(r0, r0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x527, 0x0, 0x0, 0x0, 0x49d8}, [@jmp={0x5, 0x3, 0x7, 0x5, 0x2, 0xffffffffffffffff, 0x1}, @map={0x18, 0xd, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0xffffffffffff379a, 0x41, &(0x7f0000000140)=""/65, 0x41100, 0x2, [], r2, 0xf, r3, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xf}, 0x10}, 0x70) 07:35:24 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x59, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i.o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1b", 0x1d, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) [ 531.539090][ T5777] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) dup2(r0, r0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f00000001c0)=0x14, 0x80800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) 07:35:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1b", 0x1d, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i0o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) dup2(r0, r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) 07:35:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 534.266304][ T5787] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb22758092d59a2d2d7f1bfd2c0", 0x0}, 0x11) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000340)={0xc, @raw_data="9105674afa8f569f4b690aee6972fd398312a77b766c803b156735fbbdce663f1192dc856339ee9ae8ab5c0905add8e32d4cf397ac0262d06c0fc6949b2c5d1d3f81c4b5d522077a57abbcc75ea479edf9fa3a85fe4cb521767782051492dd3307374c53e937e86f2b46c4042a02fdcf6a9133ae3803c03575cfe643f9efc42b569850a3e2b3b8ec5d18d164e1b6bcf869428ee185f69d44c6878e64c2be57e709d6780d1b19fad461a5a16bdd4598dbfaf9a1674f52ceca45dea05c7b7642cdb33e6f6dd0a25086"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x78, &(0x7f0000000040)=[@in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e24, 0x20, @local, 0x9}, @in6={0xa, 0x4e24, 0x6, @rand_addr="d8bcd480d410025f2144934db0427a58", 0x10000}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x5, 0x17, "97de35a8ea7909028fbc2143a4a629e0a27c6f735a0e47"}, 0x1c7) 07:35:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) 07:35:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 534.423084][ T5807] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9, 0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7f0b3bfe}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x81, 0xfffffcef, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x3}, 0xfffffffffffffcb8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) r2 = socket$inet6(0xa, 0x7, 0xb02) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @multicast1}, 0x4, 0x1, 0x4, 0x2}}, 0x2e) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000080)=0x2) 07:35:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iXo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) 07:35:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:30 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}, {0x4, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x54, 0x1000, 0x1}, 0x20) 07:35:30 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) timer_create(0x3, &(0x7f0000000040)={0x0, 0x1b, 0x4}, &(0x7f0000000080)=0x0) timer_getoverrun(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000003c0)=0xf) sched_getattr(r2, &(0x7f00000001c0)={0x30}, 0x30, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x153800, 0x0) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000340)={0x1, 0x3}) [ 537.383463][ T5820] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 07:35:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:30 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 537.604402][ T5847] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='i\\o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf20000000000000070000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d3500684d679c2d3f712d90000000000065070000020000000764f4186940929076793333bb0700004c0000040400000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/197], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)={0x0, r0, 0xa, 0x1}, 0x83) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f00000002c0)={0xba, &(0x7f0000000480)=""/186}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)=r0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0xfef5) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$getregset(0x4204, r2, 0x200, &(0x7f00000006c0)={&(0x7f0000000700)=""/218, 0xda}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20080000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x504, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xd45}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x800) 07:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 07:35:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 07:35:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 540.412638][ T5855] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000480)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 07:35:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='ico9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000480)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 07:35:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:36 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:36 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xa0, r1, 0x308, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100000001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x400}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x7f}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000010) dup2(r0, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='ido9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:36 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000480)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 07:35:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000040009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 543.561325][ T5891] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iio9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x20, 0x1000, 0x1}, 0x20) 07:35:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4000000000000000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x20, 0x1000, 0x1}, 0x20) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffe79, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x20, 0x1000, 0x1}, 0x20) 07:35:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='ilo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 543.881850][ T5931] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 544.070699][ T5950] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x8, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}, {0x10, 0x5}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x4c, 0x1000, 0x1}, 0x20) 07:35:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = dup(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x722429c5c9c8c210, 0x70, 0x254, 0x1, 0xffffffffffffffff, 0xffffffffffffffc1, 0x0, 0xfff, 0x201, 0x3, 0x8, 0xb35, 0xac5, 0x4, 0x1, 0x8, 0x6, 0x5, 0x7, 0x0, 0x9, 0x8, 0x8ad5, 0x7, 0x8, 0x4, 0x1, 0x80000000, 0x7, 0x2, 0x2, 0x401, 0x8, 0x100, 0x0, 0x4, 0x9, 0x6, 0x0, 0x8a99, 0x5, @perf_bp={&(0x7f0000000040)}, 0x100, 0x40, 0x3ff, 0x5, 0xfffffffffffffffc, 0x3, 0x6}, r1, 0x1, r2, 0x1) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}, {0x3, 0x1}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x44, 0x1000, 0x1}, 0x20) 07:35:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='ioo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61124c00df0900006113500001000000bf2000000000000007000000080000003d03010000000000950000000000000069260000000000030067000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d3500000000000065070000020000000707bb00004c0000001f75000000000000bf54000000000000ee0300000400f9ffad430100009c9b6001eb3365c700000005000000000000009500000000000000ce47fd5d8bcab8bbb6a1e7abcf4f44d392"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xa5, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x16) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {0x6, 0x3}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) 07:35:37 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x12801, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @broadcast}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@rand_addr="548133189c6083533f19bbc7f2d0c654", 0x5d, r2}) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 544.342419][ T5976] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fcntl$dupfd(r0, 0x0, r0) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='ipo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x34, 0x1000, 0x1}, 0x20) 07:35:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x3e, 0x0) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x1, 0x0, 0xd5e, 0x7ff, "3ab83a3905bf5bf8dc30b9c7db38d50b13f593098da9d5204a8522bbead74ccde862f78b576bfa43d249b25c91f44f3ac64c0cf1fb0954feae3ef432f19638", 0x2}, 0x60) 07:35:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x34, 0x1000, 0x1}, 0x20) [ 544.606383][ T5999] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:37 executing program 0: socket$inet6(0xa, 0x7, 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000002000000000000007000000080000003d030100000000009500000000000000692675b0e44d000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf540000000000000704000004297ab9c863c30a51000000950000000000000005000000000000009500000000000000f9be6ba709b69e9c6ad2248379709bf03ef0e816488004b898eca9a26b6a489405a869c2eceabd668acb95691099b0c82a16ef015511c239c2ece12996f33379d5a5a2a8cd9ce0edf92b2147e2500845ba91d7c18c0ec7c9bfcb2f6f55ef9497af85063c35938901c734c1d3ece1194d4b4e19ad0d098a725b177e0700212aa03ca4fb2175220cbc1e10552ca7a55c9a302a89c0eaa6b71d7b8acfff1cbdf4ecd9ce66636f5e4245f275860363dad78dafdcb6ec3285056e1dcdb4c2228b7bf7b5781d5eedf9b1975f219b6215924e01a514718feaf2514e2d5f8db8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0xffffffffffffffff}, 0x10}, 0x70) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xb, 0x42080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) fcntl$getflags(r1, 0x401) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000400)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x3, 0x1, 0x2, 0x4}) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000080)) 07:35:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x34, 0x1000, 0x1}, 0x20) [ 544.847282][ T6021] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fcntl$dupfd(r0, 0x0, r0) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iuo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {0x0, 0x3}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) 07:35:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) sched_yield() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4200, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) 07:35:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x48040, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 547.570116][ T6037] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='ixo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 547.797911][ T6055] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fcntl$dupfd(r0, 0x0, r0) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x34, 0x1000, 0x1}, 0x20) 07:35:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8, 0x10740) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 07:35:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='is%9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x34, 0x1000, 0x1}, 0x20) 07:35:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 550.653580][ T6069] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf200000000000000700505c080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf540000000000000704000000e7f8ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x9) prctl$PR_GET_SECUREBITS(0x1b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x34, 0x1000, 0x1}, 0x20) 07:35:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 550.917898][ T6095] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='is\\9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) 07:35:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000000)={[{@nouser_xattr='nouser_xattr'}]}) 07:35:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x240000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0xffffffffffff7fff, 0x0, 0x8001, 0x7]}, &(0x7f0000000140)=0xc) read$eventfd(r1, &(0x7f0000000080), 0x8) 07:35:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) [ 553.748822][ T6106] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 07:35:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) 07:35:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso:660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:50 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x480200, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x48bc}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24, @rand_addr=0x6}}, 0x1ae, 0x1ff, 0x2bb9, 0x100000001, 0x44}, 0x98) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003200)={0x0, @dev, @broadcast}, &(0x7f0000003240)=0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x200000000000013e, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x3, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 07:35:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0, 0x2e]}}, &(0x7f0000000480)=""/4096, 0x3b, 0x1000, 0x1}, 0x20) 07:35:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso<660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x6, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x7, 0x3}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x41, 0x0, 0x7f, 0x4}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x4b, 0x5}, @fwd={0xa}, @func={0xa, 0x0, 0x0, 0xc, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x100000001}}]}, {0x0, [0x61, 0x0, 0x0, 0x61]}}, &(0x7f0000000480)=""/4096, 0x7e, 0x1000, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000025c0)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000002680)={0x0, 0x4, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, [@alu={0x7, 0x7f, 0x7, 0xf, 0x6, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000001540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000001580)=""/4096, 0x40f00, 0x4, [], r2, 0xf, r1, 0x8, &(0x7f0000002600)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002640)={0x2, 0x0, 0xfb, 0x3}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x15, 0x4, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @ldst={0x2, 0x3, 0x1, 0xf, 0x2, 0xfffffffffffffff8, 0xfffffffffffffffd}, @exit], &(0x7f0000000080)='GPL\x00', 0x7, 0xf8, &(0x7f0000000140)=""/248, 0x40f00, 0x6, [], 0x0, 0xd, r1, 0x8, &(0x7f00000003c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x9, 0xfb3, 0x7}, 0x10}, 0x70) 07:35:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61, 0x0]}}, &(0x7f0000000480)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) [ 556.835566][ T6137] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) [ 557.079065][ T6166] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso\\660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}, {0x0, [0x7f, 0x7f, 0x61]}}, &(0x7f0000000480)=""/4096, 0x39, 0x1000, 0x1}, 0x20) 07:35:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) fgetxattr(r0, &(0x7f0000000040)=@random={'os2.', 'GPL\x00'}, &(0x7f0000000080)=""/70, 0x46) 07:35:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 07:35:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:53 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0xff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xc, 0x8, 0x8}, &(0x7f0000000200)=0x7fffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000100006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000001000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000080)={[0x17004, 0x10001, 0x13001, 0x111004], 0xf7, 0x72, 0x7}) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000500)) 07:35:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}, {0x0, [0x7f, 0x7f]}}, &(0x7f0000000480)=""/4096, 0x38, 0x1000, 0x1}, 0x20) [ 559.982516][ T6177] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}, {0x0, [0x7f]}}, &(0x7f0000000480)=""/4096, 0x37, 0x1000, 0x1}, 0x20) 07:35:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) [ 560.200128][ T6200] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(0x0, 0x14) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9\"60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:56 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0xfffffffffffffe24, 0x96, &(0x7f0000000140)="6c564973977a3390baab5771fd0fa1f9a8df9bd1845bc3cc913b21d244c541ed347f19a4dc412b3464928be963e3afb8fa84830fb6b0a82d7681d0aec2636793761a9289e7171651720c85ae2984277782dd50035b1e7d16094b477784bb65b4d2f0e613b10a219c867766f54eff1b92d22b10bf677ece3eb53aeecd4cada7d85d468c429ab4916179a7e6c23c80131cb85f87a878deed406eaadeec96c777c66f78e7aa420f0fbb4b09dbf5b5adbf0f1b3a6209353943dfb2a5685e687dc2f4cc58930fe0de7d06804903f7987fa4a87af0c9f20dc07c317e50c7bc83fc12d448eec194c1e71a6194", &(0x7f0000000380)=""/150, 0x81}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, &(0x7f0000000480)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 07:35:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 07:35:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x4000000, 0xfffffffffffffda6, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x25, 0x0, &(0x7f00000000c0)="9cb2275809d2c0961984364a0000000000000000000000000068b7c27907f365daa6000000", 0x0}, 0x28) 07:35:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 563.045052][ T6205] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 07:35:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 07:35:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(0x0, 0x14) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3, 0x41) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x445385fc}, 0x8) r3 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000080)={0x5, 0x34324142, 0x5, 0x46, 0x1, @discrete={0x8, 0x99b4}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9$60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) [ 563.285398][ T6230] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 07:35:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, &(0x7f0000000480)=""/4096, 0x36, 0x1000}, 0x20) 07:35:56 executing program 3: io_setup(0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x101000, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$usbmon(0x0, 0x8, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x145) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(r2, 0xffffffffffffffff, 0x98, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI-\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\x00\x02\x00\x00\x00\x00\x00\x00\xaa\x18\xb25v\t\xe6\x93\b\xa4\x0e\x199\xfe.Q\xebvB\xd2\x19&\xec?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc}g&y\x95dkdY;*\xec\xfe\xfa', 0x26e1, 0x0) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10811, r0, 0x0) 07:35:56 executing program 0: syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x864, 0x20000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x0, 0x7, 0x0, 0x5}, 0x5, 0x64a3, 'id1\x00', 'timer1\x00', 0x0, 0x8001, 0x7, 0x6, 0x4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xe, 0x22b, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) fsync(r0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0x17c, r1, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe34}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xc5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) 07:35:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, &(0x7f0000000480)=""/4096, 0x36, 0x1000}, 0x20) 07:35:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9&60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:35:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(0x0, 0x14) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000003, &(0x7f0000000300)=0x1, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e27, @rand_addr=0x5}, 0x23) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000040)='GPLsecurityvmnet1trustedem1eth1}}\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={r1, r2, r3}, 0xc) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x80008001, 0x4) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x190) close(r4) r5 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x105082) r6 = memfd_create(&(0x7f0000000080)=',!\x00', 0x0) pwritev(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) read(r6, &(0x7f0000001440)=""/184, 0xb8) fcntl$setstatus(r4, 0x4, 0x2000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f00000001c0), 0x526987c9) read(r7, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r5, r6, 0x0, 0x80003) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f00000000c0)=[{0x45, 0x602, 0x4000000000401, 0x1}, {}, {0x6}]}, 0x1) 07:35:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, &(0x7f0000000480)=""/4096, 0x36, 0x1000}, 0x20) 07:35:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x2, &(0x7f0000000040)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xfffffe2e, 0xfffffffffffffe5b, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x8}, 0x28) 07:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) utime(&(0x7f0000000000)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000004000), 0x1000) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000580)={0x78, 0x0, 0x2}, 0x78) 07:35:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000004926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x100000001}, 0x48) r1 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)=0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9(60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 563.867830][ T6390] fuse: Bad value for 'subtype' 07:35:57 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getrlimit(0x2002100000d, &(0x7f0000000200)) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000240008002abd0800078000000000080096007f00c9b86c1f12644f7ab38e58397c680001"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 07:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 563.913447][ T6403] fuse: Bad value for 'subtype' 07:35:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000004000), 0x1000) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000580)={0x78, 0x0, 0x2}, 0x78) 07:35:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:35:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, 0x0, 0x38e) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) fcntl$setstatus(r0, 0x4, 0x2400) [ 564.034712][ T6502] fuse: Bad value for 'subtype' 07:35:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000140)={0x0, {{0x2, 0x4e21, @loopback}}}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9*60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 564.083420][ T6509] fuse: Bad value for 'subtype' 07:35:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x9) socketpair$unix(0x1, 0x8000100000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read(r0, &(0x7f0000000100)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000380)) 07:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100e6ff000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000007ac7be0c8d82b0e93326b803bf8c4d00009500000000000000050000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:35:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000240), 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0x9, 0x3, 0x2d0, 0x0, 0x0, 0x138, 0x138, 0x0, 0x250, 0x250, 0x250, 0x250, 0x250, 0x3, 0x0, {[{{@uncond, 0x0, 0xc8, 0x110}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ipv6={@dev, @mcast2, [], [], 'gretap0\x00', 'bond_slave_0\x00'}, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x330) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 07:35:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:35:57 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) socketpair(0x0, 0x2, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 07:35:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9,60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:00 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dc") tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x9f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:36:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:36:00 executing program 3: clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)={0x50, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x3c, 0x0, [@generic="2557750361337a6b244bc43aad71be506c3aec2653ff9bfe5db955b598cfe308d04057", @generic="d84f00b55c22810bdc4335859708a86cac80"]}, @typed={0x4}]}, 0x50}], 0x4}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:36:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x3, 0x64, &(0x7f0000000300)="9cb2275809d2655609264b4318e9", 0x0}, 0xfffffffffffffd3b) 07:36:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9.60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:36:00 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 07:36:00 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0x2c3, &(0x7f0000000000)="9cb2275809d2c09619844bced84a", 0x0}, 0xfffffffffffffe3c) 07:36:00 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x1005, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)) 07:36:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:36:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000b6d8d0b5ec06bae00000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x146) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x306, @random="5b535a1ee0db"}, 0x7c, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}, 'bcsf0\x00'}) 07:36:03 executing program 1: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x25) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 07:36:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSETD(r0, 0x5437, 0x0) 07:36:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9060\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:03 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000017c0)='/dev/swradio#\x00', 0x1, 0x2) connect$ax25(r0, &(0x7f0000001800)={{0x3, @null, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee6002c0c250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', 0xfffffffffffffffe, 0x400, 0x7, &(0x7f0000001700)=[{&(0x7f0000000140)="6e4992cea204b2cdbba9617a4050eeaa8855a76023593393a840f858820508483cc457a21dae6fa127af89830a67f5bb1a565c09bb290e5b9a0447a33e063504a3deb0d69f1fd518116a88bdab74967aa13b6d1126ceee100b64b887a48ec7d8c35d4ccdc93876d12d101c9e4e0e5b6a4ea5a39df614da9c2796a51c6042068d047d244f48d282efc357c6efe0c009cdf27bfc49a2f032483d7902912b2bfa04dfc3e558985aa7cd35d517dbbd37f5bc6671f190a7ff3b749b121d941a39105fddfc", 0xc2, 0x7}, {&(0x7f0000000340)="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", 0xfe, 0x9}, {&(0x7f0000000480)="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", 0x1000, 0x5}, {&(0x7f0000001480)="7182484aaadf4d1e5c180338a9d6791faa63b9123014cbe50cad31f4cd3eef756809522e22763d8dee93fba012d2f04c9db51684b305ef786c8edb487bbbc09452c116d5894e76b4b01cb1be0830fa62d388ae194601b1151396c6ab099b69a2345ee63e2d49b8c75656b917cacd22b202689516ac37b1e8e77e15b0fb5387ce4037174943bc596f6e74dd466f7fbeaa1cd612d3e02276eb333d67278cad87a868c00444c938d23ad665f700d8d469e3a644075ce933f957f440459fe0fa57bd87ecde50d0ec6a70", 0xc8, 0x5}, {&(0x7f0000001580)="12e9cbcd0897e261f21a5053539473d1449088968da54a5e7a34cbc277581a2ee0653db83dc2a27db669a5580136f8a1d43add5af3e7fb8917359d83839c0b80bfe35198e3cd410272fdeeaf3ac34eb3810bfc1317c3c25f31005a8fc4a8174e32f2f2add30df0802377e5e34a86789c9d94a658ec2ca49163b07aa01fb5fd1aa1fb7afe56191c08e0663a72265bc57fa9e44e6e557c62ed835472", 0x9b, 0x6}, {&(0x7f0000000080)="6e41ec510d7c6fd5722f7ec9c342d64ef9e20cd74daeb06a8d589857942d4587740f9f5a090ba1e6b91ca49b5082094f113c74466f6b88a3b9008d51465cb304bb4e78679b52a794a82dcf5a8aef308d89efcbd279cd0dd2c2dd70c7dc12fa6083a6352725ead735a46223b98228c945fc", 0x71, 0x5}, {&(0x7f0000001640)="056c4bede6f1d0e7bba9bc87cfeb988dc6e1e1fda5f155ed1545dc7e3078b5365b342127ad555fdf64b01279b471b9c995fb61dda9b7d20039a5cba5f77887c3e0a0be26f5267b235d1a53bcf9e75d6f0a1a8f9eef748f0bf1c75a30a2cdbac140ecad42ffcd0898284b3a44c3bb637ec7f605b332c68c2443c4a835663a65f969721bfcd5e42a0d9d609f694847fa308566047f", 0x94, 0x9}], 0x20009, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:36:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 570.213498][ T6787] sp0: Synchronizing with TNC 07:36:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100)) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x400, @remote}, 0x1c) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r2, 0x0, 0x0) 07:36:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1e6}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 570.347897][ T6787] sp0: Synchronizing with TNC 07:36:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9260\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:36:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) 07:36:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0xffffffffffffff3c) 07:36:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:36:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd302e8bd6efb1200060004001000"/46, 0xd5}], 0x1}, 0x0) [ 570.642932][ T7030] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 570.658575][ T7030] IPv6: NLM_F_CREATE should be specified when creating new route [ 570.669091][ T7030] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:36:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x109000, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9460\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:36:06 executing program 1: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0100001000000000"], 0x0, 0x0, 0x0}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x57) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x2fc4e27b) signalfd4(r2, &(0x7f00000000c0), 0x8, 0x80000) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000080)='.\x00', 0xfe) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) ppoll(&(0x7f0000000380)=[{r5, 0x40}, {r2}, {r4, 0x80}, {r1, 0x4}, {r1, 0x580}, {r5, 0x100}, {r4, 0x4004}, {r3, 0x22}, {r2, 0x114}, {r4, 0xc600}], 0xa, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x47}, 0x8) write$binfmt_elf64(r5, &(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR], 0x18) fcntl$getown(r2, 0x9) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) futex(0x0, 0xb, 0x4, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) syz_open_pts(r1, 0x0) ioctl$TCXONC(r1, 0x540a, 0xfff) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0xc) 07:36:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 573.274770][ T7037] debugfs: File '7035' in directory 'proc' already present! [ 573.299747][ T7037] binder: 7035:7037 unknown command 268435457 07:36:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4e}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) [ 573.338691][ T7037] binder: 7035:7037 ioctl c0306201 20012000 returned -22 07:36:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:36:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r2 = gettid() r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x1c0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r3, r0, 0xfffffffffffffffc}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="58020000", @ANYRES16=r4, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 07:36:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9560\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 07:36:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x400040, 0x0) prctl$PR_SET_FPEXC(0xc, 0x80) 07:36:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9860\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:36:09 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000980)='/dev/radio#\x00', 0x3, 0x2) ioctl$int_out(r0, 0x5460, &(0x7f00000009c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r1, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000040)="aa7e590c721f6dcc994bb286a9c4c9e6a232bcb26041af2643e2580a8eaa57e73cd98e722016047a0c44d02a1623a8a2f869a5bf26c136d574f698b24d2898c1654831343901128c9164501ad3e3f9b6ce6a2b3be4b3b074a659ff8f955f39406d8fdce3e805546448e807ac8920f64db143d79a90519862a329af5331a0b66cfebfa56eea2901866975b36ba96676f956fb0162b446", 0x96}, {&(0x7f0000000140)="35f77924c8280b9c6e46c442134de46927625479a58c419dbb6ca0c57492fca9d6ae11d25d79e05e6d2113cd2944a5898a5e1220a3cde19683e58e565ae36317a90d2cb8b5ded0f30d83ac69390f74fbd7d4f7c26d19a1a5cf49ed5c56d1e180b5567225b6a073425408c12784669b8f2bb8df04447eb1bf3e933970d92eb5cd37b6dedacb086f7eb9544673", 0x8c}, {&(0x7f0000000340)="ac9e122bf5509c8660083a8265fdbdef3767867bd45fce16e6fa0720ec077a87fbf38fdd156f44bc8a85bbdeabab909b4093475a2e52fc94d88c5a3ddb936e26d735ec94cbff31358321fb72e87eedfaebed6f0310b25dbe53a3275b225ddcfb224043a3bafbcc4799790de6e25c474aad51c622bb92640757cfb12a157c932fbd0188330c8161b0028d3a", 0x8b}, {&(0x7f0000000480)="8043eb1366ef399364263b7a232b4eef3e83585564175d8e06485eaba326b38919720334e9b66d4b8d05809fa081469234070baab23c9bd6f9a890d2feedbeaa78c0406feaedb19651af1240a15bc9624e849961c8e100b1d475ef56cf8a21699218084ca0ac47b67ca697f9bda39496619fa7cc23e201cb6b8a07aff2156c366bf41dbfe1b5d7a56239080b4c695f4a5af73240d5b4f92220a6c8cb55755a9afa9baf7e6e551c7005ef3ae4912efe197829e7f219f11ef8389fc6953fbb7f8ab9b108303f7a3e22e76e0e12931c89edf8f93fbb178527b8", 0xd8}, {&(0x7f0000000200)="f8624e1c583251f1bbf390cb53bd318fcaad46e7f4e8d9aefe6c9a06b4483371820b96dec6f139", 0x27}, {&(0x7f0000000580)="1d9346c2cf40df70231f363cc92cf2bff01030e015691314b37de752e1ad07a896b813fb0508041a8e50b51082e7b6a0931ce444e301810155c853b1c13d0323d604c3e19516d79641000b8fe1e8a3c364933ed7ee6b7ee166cf5b5ff85a48729a3e799232e3116a9cb3650f1ca3675ec0501598132a7d8814fd78fa7948b4f8db97df9b5e988b5b5c4f7caa67cbf2b7", 0x90}, {&(0x7f0000000640)="46070951f9a9bf312bdbac89b2fb6b999563fbd18c7cfac1368ac6675e72999a21c42dce1d02082cce46619ed0f3bc2768b6581bdcb25f691666501b5c35cbdaa847764994f91946dc3060c537ece5f6cf3c512e194f5597df2e44819908000f0f47b64ba959f27790286cf6589bec034821c0cbc0e6294cecc86f75515b1dc47b46f03b5158a10c3128b69bf6cfa36dee34b8916e371159e27521f1aa6391845a947e16eafcea97ffbdd4aed95b2581eb9bb3b2ac17d25b826fc2c53630586674e42251f07919814f7af54e92fdf7f76412698eaa30560edfb84dbf60d02945c2f1de86371e25ccd713518d1dcb0bdd", 0xf0}, {&(0x7f0000000740)="cbffcfa631800623fbf093b190872b3197781a07c73cebd6b5e0693974a05948aaadc20c0eb5c53c756ab3ad3f0f85baca5bade58dd93fd66613a6291641b9beeb71b29969cc76128580d2bf27b270654b3149e9cb5d332531d033db2d13b153c3b2f443743d0e70357a300e069c9807a6a474e950328eacb3d6b67805ff4a2b4879a7726aa1771b86e7779424a20fb7ff864070e2fef4f9aef08f7e04328a588358da459a0571e3ce211e88f8c3152d1bdf", 0xb2}], 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="780000000000000029000000360000007e0c00000000000007500000000812000000010000000000000007000000000000003d00000000000000000000000080ffff0000e800000000000000ffff00000000000001000000000000000502000105020400010400000000200000000000000029000000360000006c000000000000000401fd00000000001400000000000000290000000b000000000010000000000014000000000000002900000043000000ff07000000000000c1296b3647ff6e2a93e2152b0b6018b15a86"], 0xc8}}], 0x1, 0x1) 07:36:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:09 executing program 1: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0100001000000000"], 0x0, 0x0, 0x0}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x57) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x2fc4e27b) signalfd4(r2, &(0x7f00000000c0), 0x8, 0x80000) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000080)='.\x00', 0xfe) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) ppoll(&(0x7f0000000380)=[{r5, 0x40}, {r2}, {r4, 0x80}, {r1, 0x4}, {r1, 0x580}, {r5, 0x100}, {r4, 0x4004}, {r3, 0x22}, {r2, 0x114}, {r4, 0xc600}], 0xa, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x47}, 0x8) write$binfmt_elf64(r5, &(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR], 0x18) fcntl$getown(r2, 0x9) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) futex(0x0, 0xb, 0x4, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) syz_open_pts(r1, 0x0) ioctl$TCXONC(r1, 0x540a, 0xfff) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0xc) 07:36:09 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1000000008000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x13f, 0xf}}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0}, 0x28) [ 576.389332][ T7083] debugfs: File '7081' in directory 'proc' already present! [ 576.425080][ T7083] binder: 7081:7083 unknown command 268435457 [ 576.447059][ T7083] binder: 7081:7083 ioctl c0306201 20012000 returned -22 07:36:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0}, 0x28) 07:36:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)=0x6) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4000, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000080)={0x6, 0xffffffff7fffffff}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000180)={0xffffffffffffffff, 0x7, 0x4, 0x40100000, {}, {0x4, 0x1, 0x5, 0x9, 0xc85c, 0x10001, "83e2101c"}, 0xffff, 0x3, @planes=&(0x7f0000000140)={0x3ff, 0x40, @mem_offset=0x1f, 0x7fffffff}, 0x4}) 07:36:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9:60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x3f4, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) 07:36:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf5400000000feea070400000400f9ffad43010000000000950000000000000005000000000000009500540000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000014c0)=0x1, 0xfffffd34) r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000480)=""/4096) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x2, &(0x7f00000000c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000140)='syzkaller\x00', 0xdd1, 0x2, &(0x7f0000000180)=""/2, 0x40f00, 0x1, [], r3, 0x12, r2, 0x8, &(0x7f0000000340)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xf, 0x7fffffff, 0xa82}, 0x10}, 0x70) 07:36:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffd}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) 07:36:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9<60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:12 executing program 1: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0100001000000000"], 0x0, 0x0, 0x0}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x57) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x2fc4e27b) signalfd4(r2, &(0x7f00000000c0), 0x8, 0x80000) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000080)='.\x00', 0xfe) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) ppoll(&(0x7f0000000380)=[{r5, 0x40}, {r2}, {r4, 0x80}, {r1, 0x4}, {r1, 0x580}, {r5, 0x100}, {r4, 0x4004}, {r3, 0x22}, {r2, 0x114}, {r4, 0xc600}], 0xa, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x47}, 0x8) write$binfmt_elf64(r5, &(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR], 0x18) fcntl$getown(r2, 0x9) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) futex(0x0, 0xb, 0x4, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) syz_open_pts(r1, 0x0) ioctl$TCXONC(r1, 0x540a, 0xfff) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0xc) 07:36:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) [ 579.457310][ T7229] debugfs: File '7227' in directory 'proc' already present! 07:36:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x952df36e0c3c6568, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e20, 0xf1, @ipv4={[], [], @remote}, 0x10000}, r2}}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) [ 579.505653][ T7229] binder: 7227:7229 unknown command 268435457 [ 579.527879][ T7229] binder: 7227:7229 ioctl c0306201 20012000 returned -22 07:36:12 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:12 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9>60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:15 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x7, 0x0, &(0x7f0000000000)="743d7d516f5b0e", 0x0}, 0x28) 07:36:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x7e) 07:36:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9B60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a98, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x100000000000000}, 0x100) 07:36:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x10) 07:36:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x7, 0x0, &(0x7f0000000000)="743d7d516f5b0e", 0x0}, 0x28) 07:36:15 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:15 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:15 executing program 1: 07:36:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9D60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0x7, 0x0, &(0x7f0000000000)="743d7d516f5b0e", 0x0}, 0x28) 07:36:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xa1, 0x0, &(0x7f0000000140)="9c909e44fbb2275809d2c09600000000d84a190c1eec5bc38495d0f095d8054a717a99641a489e8ecc585d3bca31689d2ee86e96a22fa20acd8e3669c69c595e77a1dd4f16adc7ddf8f9ea359c1e49ad9edf8a47b10761e9e76aad9e878e6d15c5d05cf0ee70f6cd37eaed08eddaa9fd37a82fd39584799aa4381ce6af9bea1949407ca5f75067f56f34676c43b4ae0b0766a2f126e1f55a146cf1b5d0e2afe48a", 0x0}, 0x28) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x101000, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x3112, &(0x7f00000000c0)=0x2) 07:36:16 executing program 1: 07:36:16 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60014bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) 07:36:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xb, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148", 0x0}, 0x28) 07:36:18 executing program 1: 07:36:18 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:36:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9\\60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:18 executing program 1: 07:36:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xb, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148", 0x0}, 0x28) 07:36:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:36:18 executing program 1: 07:36:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x200040) r2 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) 07:36:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:36:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9]60\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xb, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148", 0x0}, 0x28) 07:36:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x19, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000083abd6c5bf8d874d3adeff184d4d5bd12f103403301dcbef19428491512e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0, 0x10000}, 0x28) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000080)) 07:36:21 executing program 1: 07:36:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:36:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7d, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 07:36:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 07:36:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xd, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a", 0x0}, 0x28) 07:36:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 07:36:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 07:36:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xd, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a", 0x0}, 0x28) 07:36:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:25 executing program 1: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96\"0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 07:36:25 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000002480)=[{&(0x7f00000001c0)='a', 0x1}], 0x1) 07:36:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xd, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a", 0x0}, 0x28) 07:36:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 07:36:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x2d, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81e7ec864a076fe86fb8699025520efe9a340deaab796978e9d86a548b877c", 0x0, 0x100, 0xf2ffffff}, 0x28) openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000002280)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003440)=[{&(0x7f0000002300)=""/96, 0x60}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/148, 0x94}], 0x3}, 0x2002) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000034c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000003580)={0xa, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20f9, 0x0, 0x0, 0x0, 0x3c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @alu={0x7, 0x100000001, 0xf, 0x0, 0x0, 0x30, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x14}, @map={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0xa4, &(0x7f0000000400)=""/164, 0x41100, 0x6, [], r2, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000003500)={0x6, 0x2}, 0x8, 0x10, 0x0}, 0x70) [ 591.770681][ T7371] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 07:36:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:36:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 07:36:25 executing program 0: setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x2e, 0x0, 0x3f00000000000000, 0x100000000000000}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$team(0x0) 07:36:25 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) sendmmsg$inet(r0, &(0x7f0000000b80)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x2, 0x0) 07:36:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96$0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 07:36:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000006c0), 0x0) 07:36:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x800000000000937e, &(0x7f00000001c0)="01000000000000007f") 07:36:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2b93c05f19c0420cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961", @ANYRESHEX], 0x0, 0x74}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 07:36:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 07:36:28 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) tkill(r0, 0x12) ptrace$cont(0x9, r0, 0x0, 0x0) [ 594.843980][ T7413] autofs4:pid:7413:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 594.850554][ T7418] ptrace attach of "/root/syz-executor.0"[7416] was attempted by "/root/syz-executor.0"[7418] 07:36:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 07:36:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 07:36:28 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x87) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 07:36:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x6}]}, 0xc0c21a5d) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740), 0x1000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10004) sendfile(r1, r2, 0x0, 0x72439a6b) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) 07:36:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96&0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 07:36:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000400)=0xffffffff00000001) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x802, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)) 07:36:31 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x6}]}, 0xc0c21a5d) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740), 0x1000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10004) sendfile(r1, r2, 0x0, 0x72439a6b) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) 07:36:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x1}, 0x0) 07:36:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 07:36:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x1}, 0x0) 07:36:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96(0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:31 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x6}]}, 0xc0c21a5d) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740), 0x1000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x10004) sendfile(r1, r2, 0x0, 0x72439a6b) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) 07:36:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x1}, 0x0) 07:36:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d200050013", 0x17}], 0x1}, 0x0) 07:36:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96*0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d200050013", 0x17}], 0x1}, 0x0) 07:36:34 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) 07:36:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r0, 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 07:36:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:36:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d200050013", 0x17}], 0x1}, 0x0) 07:36:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x1}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 07:36:34 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:34 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0x4020565b, &(0x7f0000000300)) 07:36:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f000100008002", 0x23}], 0x1}, 0x0) 07:36:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96,0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:34 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x4, &(0x7f00000001c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x18, 0x1, 0x84}]}, &(0x7f0000f6bffb)='\xd5$\xe8\x83', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:36:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f000100008002", 0x23}], 0x1}, 0x0) 07:36:34 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4004) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) sendmsg$kcm(r2, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x3a) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 601.460317][ T7531] device nr0 entered promiscuous mode [ 601.723196][ T7536] device nr0 entered promiscuous mode 07:36:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r0, 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 07:36:37 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f000100008002", 0x23}], 0x1}, 0x0) 07:36:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96.0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 07:36:37 executing program 0: lseek(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000003c0)="ab887dfc949b5f2414e96afd10492e80fe9b068cb19854db6130008e4310ac5e9f0abad9a5350997bca5a9063847cc5203bdf5ca219769c77e") connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x800010b, 0x18) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e", 0x8}], 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000001ec0)={0x0, 0x0, 0x2080}) shutdown(0xffffffffffffffff, 0x1) io_submit(0x0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0xff2b}]) r2 = epoll_create(0x143) r3 = epoll_create(0x800f61) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000000280)="3b387516e793f3a5a5dfc99bc551eaf63e09e53a605f9e4ee399bf81f6d1b0206792e783450b01818a3d3a8d53f01e939bbf0ed3ea6d7cc4bff742d15c46f72353920ca0cdb328014d1cbbcd8ebf213a912f1d3e895a0d660cb31882b9501c3345f6e58de3f87ba89bf56c3a95dede8082df975362ceece10625d28ece2bf45fbf2700b3c6214539ac2513f5e530c5b3d4780300e66202c13a3e9007a06866a2a741e249aaf3538b2a0361d043d723a69d1ba9ba99bddc56e2d9cf13e26bfa0ca32312092f05", 0xc6}, {&(0x7f0000000180)="fb5ead3bbb4a65fc3d0dcc011d2993d025b9063fdf98297bc79b39f351c225472346c755fe6ef36e7e67", 0x2a}, {&(0x7f00000003c0)}, {&(0x7f0000001c80)="c3ba89cf35b1927ef63d0031dbd89a53b5061f48634aa80fdb990360764bfe9027dc2606b18444ddb5ad7438c73eddd811faafba5f73c051e94b2078a000a02bc2d2931296a5ad3a84d29677d18af66c68b70989cff07fc9bbb13784038c10d791e4a437ddf4ab7ab5e43ea000e88d47ddcb3f8d454f550de3541f02c692fc50f514f6e48029c2376d65eac6c919d2c226ee4353209d9985db09878f445ba7018d5370b7f743311a891ccf5de26b10f1fa06af6df31f779cd58f2a27d2a50720ff53fb5e89889c14860ccb8c5c0c2f95d425128d691db1228640fe1af90c7da38e1ccdde802a3f92b6cc8b7808fcd0443e", 0xf1}, {&(0x7f0000001d80)="2b2eb14abd1bf366bd8a5e9a2f8a35e2d6a7d8a29c8f989e2854c515d5c4b9d45acccb7955eb3ced263d9691c3d220658ddd783594a0433f0e757a58c316195873aa8b00fb74c93635324b5779785144c9f276d758b5311a13c0712c79fcec1b1e7e4a3b7fe45a070915e4adf13a60dfbb11cd368494107380c9cd41f7ded8bdd9917f2b8ed4de3bc62969070ce0e939c8384ba89a", 0x95}], 0x6}, 0x20008000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f000000dff4)) 07:36:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f8", 0x29}], 0x1}, 0x0) 07:36:37 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) inotify_init() perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 07:36:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f8", 0x29}], 0x1}, 0x0) 07:36:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9600\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:37 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r0, 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 07:36:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000380)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f207c804a00d000000430052fb0a0002000e0ada1b40d805000600c50083b8", 0x2e}], 0x1}, 0x0) 07:36:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f8", 0x29}], 0x1}, 0x0) 07:36:40 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x5100, 0x0) 07:36:40 executing program 1: r0 = eventfd(0xef) read$eventfd(r0, &(0x7f00000003c0), 0x8) 07:36:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9620\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f0", 0x2c}], 0x1}, 0x0) 07:36:40 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11d3a50d5e0bcfe47bf070") 07:36:40 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x5100, 0x0) 07:36:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x4, &(0x7f00000001c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x18, 0x1, 0xa4}]}, &(0x7f0000f6bffb)='\xd5$\xe8\x83', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:36:40 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x5100, 0x0) 07:36:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f0", 0x2c}], 0x1}, 0x0) 07:36:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:43 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 07:36:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9640\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:43 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x8, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x67, 0x2, 0x6f5, "0922ad2a849cdc2c8a16fe88b1258826", "e6f7a277db6eb9f4e4bb91586e251a33e0133b49b62b83dda638ec53f5adff22dcf0a4d98e49b8921185e0fde227d4b4a3f39e59d9260859936c9230495254a845c998ea3139c3b6b983e7cd41166c9dde0c"}, 0x67, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 07:36:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f0", 0x2c}], 0x1}, 0x0) 07:36:43 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f017", 0x2d}], 0x1}, 0x0) [ 610.343984][ T7637] ptrace attach of "/root/syz-executor.5"[7636] was attempted by "/root/syz-executor.5"[7637] 07:36:43 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5100, 0x0) 07:36:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f017", 0x2d}], 0x1}, 0x0) 07:36:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9650\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:43 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f017", 0x2d}], 0x1}, 0x0) 07:36:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5100, 0x0) 07:36:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9680\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:46 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:46 executing program 1: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f00000003c0), 0x8) 07:36:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5100, 0x0) 07:36:46 executing program 3: socketpair$tipc(0x1e, 0x2000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f00000009c0)=""/24, 0x18) r2 = dup2(r0, r1) write$binfmt_elf32(r0, 0x0, 0x0) write$FUSE_LK(r2, &(0x7f00000000c0)={0x28}, 0x28) [ 613.409830][ T7675] ptrace attach of "/root/syz-executor.5"[7674] was attempted by "/root/syz-executor.5"[7675] 07:36:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96:0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5100, 0x0) 07:36:46 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:46 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) inotify_init() fsync(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 07:36:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 07:36:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96<0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:49 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:49 executing program 3: 07:36:49 executing program 1: 07:36:49 executing program 3: 07:36:49 executing program 1: 07:36:49 executing program 3: 07:36:49 executing program 1: 07:36:49 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) 07:36:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96>0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:52 executing program 3: 07:36:52 executing program 1: 07:36:52 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 07:36:52 executing program 2: 07:36:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96B0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:52 executing program 3: 07:36:52 executing program 2: 07:36:52 executing program 1: 07:36:52 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:52 executing program 3: 07:36:52 executing program 2: 07:36:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:55 executing program 1: 07:36:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96D0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:55 executing program 3: 07:36:55 executing program 2: 07:36:55 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:36:55 executing program 3: 07:36:55 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1005, 0xc01) poll(&(0x7f0000000380)=[{r0}], 0x1, 0x8) 07:36:55 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffd17, 0x0}, 0x3) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f00000004c0)='./file1\x00', 0xff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000340)=""/168, 0xa8) fcntl$setown(0xffffffffffffffff, 0x8, r1) r3 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, &(0x7f0000000140)=0x80, 0x80800) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) r5 = getuid() r6 = getuid() lstat(&(0x7f0000000d00)='./file1\x00', &(0x7f00000007c0)) stat(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900), 0x0, &(0x7f0000000980)) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() getresgid(&(0x7f0000000a80), &(0x7f0000000ac0)=0x0, 0x0) getgroups(0x1, &(0x7f0000000b40)=[0xffffffffffffffff]) r12 = getgid() semctl$IPC_RMID(0x0, 0x0, 0x0) r13 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2, r4}, {0x2, 0x7, r5}, {0x2, 0x3}, {0x2, 0x2, r6}], {0x4, 0x7}, [{0x8, 0x0, r7}, {0x8, 0x5}, {0x8, 0x2, r8}, {0x8, 0x2, r9}, {0x8, 0x7, r10}, {0x8, 0x1, r11}, {0x8, 0x0, r12}, {0x8, 0x0, r13}, {0x8, 0x1}], {0x10, 0x6}}, 0x8c, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 07:36:55 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:36:55 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfb, 0x0, 0x6], 0x40000}) 07:36:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96\\0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 622.933433][ T7968] overlayfs: workdir and upperdir must reside under the same mount 07:36:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:36:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81e7ec864a076fe86fb8699008", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:36:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:36:58 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 07:36:58 executing program 1: unlink(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x20000) unshare(0x40000000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 07:36:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso96]0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:36:58 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) 07:36:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00"/246], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e81e7ec864a076fe86fb8699008", 0x0, 0x100, 0xf2ffffff}, 0x28) 07:36:59 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 07:36:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966\"\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:36:59 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) [ 625.816865][ T7984] IPVS: ftp: loaded support on port[0] = 21 [ 626.144471][ T7993] IPVS: ftp: loaded support on port[0] = 21 07:37:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:01 executing program 3: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:01 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) 07:37:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966$\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:37:01 executing program 1: unlink(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x20000) unshare(0x40000000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 07:37:02 executing program 3: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:02 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 628.793276][ T8018] IPVS: ftp: loaded support on port[0] = 21 07:37:02 executing program 3: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) [ 628.860129][ T8017] IPVS: ftp: loaded support on port[0] = 21 07:37:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966%\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:02 executing program 3: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:02 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 629.424831][ T8027] IPVS: ftp: loaded support on port[0] = 21 07:37:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:05 executing program 3: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:05 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 07:37:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966&\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff61a4f0ff00000000b706000002ffffffae4605000000000007040000010000003604000001000000b7050000220080006a0a00fe00000000850000000a000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 07:37:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:37:05 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 07:37:05 executing program 3: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:05 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) dup3(r1, r0, 0x0) [ 631.848748][ T8063] IPVS: ftp: loaded support on port[0] = 21 07:37:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:05 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000001000/0x11000)=nil, 0x0, 0x7, 0x0, &(0x7f0000000000/0x5000)=nil, 0x7ff}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966(\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000020000003e4605000000000007040000010000000404000001000000b7050000220080006a0a00fe00000000850000000a000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 07:37:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:08 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0), 0x20) 07:37:08 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966*\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:08 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x28a}}, 0x20) 07:37:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc}}, {{@in6=@local}, 0x0, @in6=@local}}, 0xe8) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 07:37:08 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:08 executing program 3: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966,\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:11 executing program 2: 07:37:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:11 executing program 3: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966-\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:11 executing program 1: 07:37:11 executing program 1: 07:37:11 executing program 2: 07:37:11 executing program 3: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4, 0x9}) 07:37:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 07:37:11 executing program 2: 07:37:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:14 executing program 1: 07:37:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966.\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:14 executing program 2: 07:37:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 07:37:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:37:14 executing program 1: 07:37:14 executing program 2: 07:37:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 07:37:14 executing program 2: 07:37:14 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 07:37:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:17 executing program 1: 07:37:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x0, 0x9}) 07:37:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966/\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:17 executing program 2: 07:37:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 07:37:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 07:37:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000000)={0x2004}) creat(&(0x7f0000000180)='./file0\x00', 0x80) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000140)={0x3, [0x0, 0x0, 0x0]}) lgetxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:37:17 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x1000000005c832, 0xffffffffffffffff, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000c00000/0x400000)=nil) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 07:37:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x0, 0x9}) 07:37:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mknodat(0xffffffffffffffff, 0x0, 0xa000, 0x0) 07:37:17 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x1000000005c832, 0xffffffffffffffff, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000c00000/0x400000)=nil) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 07:37:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x0, 0x9}) 07:37:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9662\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:20 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 07:37:20 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)=ANY=[]) 07:37:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso96\"0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9664\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x7e) 07:37:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9666\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:23 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getrlimit(0x2002100000d, &(0x7f0000000200)) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000240008002abd0800078000000000080096007f00c9b86c1f12644f7ab38e58397c680001"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 07:37:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x7e) 07:37:23 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getrlimit(0x2002100000d, &(0x7f0000000200)) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000240008002abd0800078000000000080096007f00c9b86c1f12644f7ab38e58397c680001"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 07:37:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9668\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x7e) 07:37:26 executing program 2: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:26 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getrlimit(0x2002100000d, &(0x7f0000000200)) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000240008002abd0800078000000000080096007f00c9b86c1f12644f7ab38e58397c680001"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 07:37:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966:\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:26 executing program 2: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:26 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:26 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x0, &(0x7f0000000300)="9cb2275809d2c09619844bced84a", 0x0}, 0x28) getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:26 executing program 2: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966<\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:29 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000100)='\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000a}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x70) getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:29 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:29 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:29 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0xeafd, 0x9186, 0x8, 0x5f, 0x2, 0x7, 0x4, 0x9c7b, 0x1, 0x1}) getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:29 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000003d350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966>\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:32 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:32 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipx\x00') getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:32 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:32 executing program 1: r0 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:32 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:33 executing program 1: r0 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:33 executing program 0: getrlimit(0x2002100000d, &(0x7f0000000200)) 07:37:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966B\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:35 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:35 executing program 1: r0 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:35 executing program 0: getrlimit(0x0, &(0x7f0000000200)) 07:37:35 executing program 0: getrlimit(0x0, &(0x7f0000000200)) 07:37:36 executing program 1: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:36 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:36 executing program 2: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:36 executing program 0: getrlimit(0x0, &(0x7f0000000200)) 07:37:36 executing program 1: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:39 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966D\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:39 executing program 2: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:39 executing program 1: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:39 executing program 0: getrlimit(0x2002100000d, 0x0) 07:37:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 07:37:39 executing program 2: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000180)={0x4}) 07:37:39 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 07:37:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 07:37:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 07:37:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966\\\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:37:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 07:37:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 07:37:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0x0, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 07:37:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:37:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 07:37:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0x0, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)) 07:37:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966\'\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 07:37:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0x0, @win={{0x9151, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 07:37:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)) 07:37:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x0, 0x4, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:45 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 07:37:45 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)) 07:37:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966)\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x0, 0x0, 0x6, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:45 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 07:37:48 executing program 2: 07:37:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{0x0, 0x0, 0x0, 0x8}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:48 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso966\xff\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:48 executing program 2: 07:37:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x2, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:48 executing program 2: 07:37:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 07:37:48 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x0, 0xffffffffffffffc0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:51 executing program 2: 07:37:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 07:37:51 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 07:37:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:51 executing program 2: 07:37:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x0, 0x0, &(0x7f0000000140)={{0x7fff, 0x6, 0x9c2}, &(0x7f00000000c0)={{0xffff, 0x7ff, 0x7138, 0xffffffff}, &(0x7f0000000080)={{0x6, 0x7}}}}, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 07:37:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 07:37:51 executing program 2: 07:37:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 07:37:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:54 executing program 2: 07:37:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 07:37:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 07:37:54 executing program 2: 07:37:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x1}, 0x0) 07:37:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="d68de24881714f33b6ed28e0361e07d5ae7431d4e59f19d8ead8bbc2c7983eaf385f1e8abe1eba2c38b722a91164a22781a38936c9dfe215cbbc92076080820a42af4239b8293801cea6fe1a7a36c953b957e275f067e3898ddaf8", 0x4}}) 07:37:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 07:37:54 executing program 2: 07:37:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x1}, 0x0) 07:37:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:37:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, 0x0}, 0x0) 07:37:57 executing program 2: 07:37:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) 07:37:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x05', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:37:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x1}, 0x0) 07:37:57 executing program 2: 07:37:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0xe, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 07:37:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d200050013", 0x17}], 0x1}, 0x0) 07:37:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, 0x0}, 0x0) 07:37:57 executing program 2: 07:37:57 executing program 1: poll(&(0x7f0000000000), 0x200000000000002e, 0x4f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xd14, 0x0, 0x0, 0x800e00481) readv(r0, &(0x7f0000001380)=[{&(0x7f00000010c0)=""/149, 0x95}, {0x0}], 0x2) shutdown(r0, 0x0) 07:38:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d200050013", 0x17}], 0x1}, 0x0) 07:38:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000040)=""/43, 0x2b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e0080e) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000200)=""/97, 0x7}, {0x0}], 0x100000000000023e) shutdown(r2, 0x0) 07:38:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, 0x0}, 0x0) 07:38:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x06', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000180)=""/224, 0xe0}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) r3 = dup(0xffffffffffffffff) shutdown(r3, 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000000)=""/128, 0x3a4}, {0x0}, {0x0, 0x3df}, {0x0, 0x1df}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2) shutdown(r2, 0x0) 07:38:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d200050013", 0x17}], 0x1}, 0x0) 07:38:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)}, 0x0) 07:38:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f000100008002", 0x23}], 0x1}, 0x0) 07:38:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\a', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)}, 0x0) 07:38:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f000100008002", 0x23}], 0x1}, 0x0) 07:38:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)}, 0x0) 07:38:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\b', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[]}}, 0x0) 07:38:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f000100008002", 0x23}], 0x1}, 0x0) 07:38:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f8", 0x29}], 0x1}, 0x0) 07:38:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[]}}, 0x0) 07:38:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\t', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:06 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:06 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f8", 0x29}], 0x1}, 0x0) 07:38:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[]}}, 0x0) 07:38:06 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:06 executing program 2: ioctl(0xffffffffffffffff, 0x800000000000937e, 0x0) 07:38:06 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f8", 0x29}], 0x1}, 0x0) 07:38:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\n', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) 07:38:09 executing program 2: ioctl(0xffffffffffffffff, 0x800000000000937e, 0x0) 07:38:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f0", 0x2c}], 0x1}, 0x0) 07:38:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:09 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:09 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:09 executing program 2: ioctl(0xffffffffffffffff, 0x800000000000937e, 0x0) 07:38:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f0", 0x2c}], 0x1}, 0x0) 07:38:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) 07:38:09 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:10 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f0", 0x2c}], 0x1}, 0x0) 07:38:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) 07:38:10 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f017", 0x2d}], 0x1}, 0x0) 07:38:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 07:38:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759"], 0x30}}, 0x0) 07:38:12 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r0, 0x800000000000937e, 0x0) 07:38:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660#', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 07:38:12 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x800000000000937e, 0x0) 07:38:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f017", 0x2d}], 0x1}, 0x0) 07:38:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759"], 0x30}}, 0x0) 07:38:13 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x800000000000937e, 0x0) 07:38:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 07:38:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000500130111404b480f0001000080020000000300f88000f017", 0x2d}], 0x1}, 0x0) 07:38:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759"], 0x30}}, 0x0) 07:38:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 07:38:15 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x800000000000937e, 0x0) 07:38:16 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\''], 0x1) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) 07:38:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 07:38:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000"], 0x48}}, 0x0) 07:38:16 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) [ 702.798683][ T8793] ISOFS: Unable to identify CD-ROM format. 07:38:16 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) [ 702.892523][ T26] audit: type=1804 audit(1565077096.174:37): pid=8802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir507701852/syzkaller.gc4jib/815/file0/bus" dev="ramfs" ino=79677 res=1 07:38:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 702.938194][ T8793] ISOFS: Unable to identify CD-ROM format. 07:38:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x400000000031, 0xffffffffffffffff, 0x0) futex(0x0, 0xc, 0x0, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) 07:38:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000"], 0x48}}, 0x0) 07:38:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 07:38:19 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) 07:38:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x20000) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 07:38:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 07:38:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000"], 0x48}}, 0x0) [ 705.901066][ T8920] ISOFS: Unable to identify CD-ROM format. 07:38:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 07:38:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {0xfffda007}, [@IFLA_LINKINFO={0xf, 0x12, @vti={{0x8, 0x1, 'vti6'}, {0x4}}}]}, 0x30}}, 0x0) [ 705.998714][ T8920] ISOFS: Unable to identify CD-ROM format. 07:38:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000"], 0x54}}, 0x0) [ 706.077026][ T9038] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 706.097404][ T9033] IPVS: ftp: loaded support on port[0] = 21 [ 706.352072][ T9037] IPVS: ftp: loaded support on port[0] = 21 07:38:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x0, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x9, 0x40) r0 = syz_open_dev$midi(0x0, 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) unshare(0x40000000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x1b, &(0x7f0000000280)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000071260000a33bb11fbf6700000000af6789a943a1e937591201391d88560de4d07800000000000000ff07006706000002000000070600000ee6005b363cac453f006937d726af494200bf250000000000003d630100000000006507000002000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad4301000000000095000000000000000500000000000000950000000000000067b53f1e9f6ea50cd15353b047b3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 07:38:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000"], 0x54}}, 0x0) 07:38:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x20000) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 07:38:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x0, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) [ 708.936859][ T9049] ISOFS: Unable to identify CD-ROM format. 07:38:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000"], 0x54}}, 0x0) [ 709.035811][ T9047] IPVS: ftp: loaded support on port[0] = 21 [ 709.060310][ T9046] IPVS: ftp: loaded support on port[0] = 21 07:38:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x0, 0x7, 0xfffffffffffffffd}, 0x14}}, 0x0) [ 709.103020][ T9049] ISOFS: Unable to identify CD-ROM format. 07:38:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000"], 0x5a}}, 0x0) 07:38:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x0, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x0, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000"], 0x5a}}, 0x0) [ 709.343419][ T9168] ISOFS: Unable to identify CD-ROM format. [ 709.438883][ T9168] ISOFS: Unable to identify CD-ROM format. 07:38:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x9, 0x40) r0 = syz_open_dev$midi(0x0, 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) unshare(0x40000000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x1b, &(0x7f0000000280)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000071260000a33bb11fbf6700000000af6789a943a1e937591201391d88560de4d07800000000000000ff07006706000002000000070600000ee6005b363cac453f006937d726af494200bf250000000000003d630100000000006507000002000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad4301000000000095000000000000000500000000000000950000000000000067b53f1e9f6ea50cd15353b047b3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 07:38:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x0, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:38:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000"], 0x5a}}, 0x0) 07:38:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x20000) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 07:38:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7}, 0x14}}, 0x0) [ 712.550228][ T9178] ISOFS: Unable to identify CD-ROM format. 07:38:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000"], 0x5d}}, 0x0) 07:38:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7}, 0x14}}, 0x0) [ 712.675114][ T9189] IPVS: ftp: loaded support on port[0] = 21 [ 712.686343][ T9178] ISOFS: Unable to identify CD-ROM format. 07:38:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000"], 0x5d}}, 0x0) 07:38:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 712.765459][ T9183] IPVS: ftp: loaded support on port[0] = 21 07:38:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000"], 0x5d}}, 0x0) [ 712.903110][ T9303] ISOFS: Unable to identify CD-ROM format. [ 713.060555][ T9303] ISOFS: Unable to identify CD-ROM format. 07:38:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e000040000000000000000"], 0x5f}}, 0x0) 07:38:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x14, 0x4000080000003, 0x7}, 0x14}}, 0x0) 07:38:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f00000004c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002c40)={[{@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}]}) 07:38:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r0}, {r1}], 0x2, &(0x7f0000001540), &(0x7f0000001580)={0x78d0}, 0x8) 07:38:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660 ', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}}, 0x20) tkill(r1, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:38:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$rose(0xffffffffffffffff, &(0x7f0000000780)=@full={0xb, @remote, @remote, 0x0, [@null, @bcast, @bcast, @netrom, @bcast, @default]}, &(0x7f00000007c0)=0x40, 0x0) getsockopt$rose(r1, 0x104, 0x6, &(0x7f0000000800), &(0x7f0000000840)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500)=0x80000000, 0x4) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000000000)={'veth0\x00', @ifru_ivalue=0x7}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) getsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000440), &(0x7f0000000480)=0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1f, 0x7, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x14b8e11c}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xf, r3, 0x8, &(0x7f00000004c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x0, 0x8e84, 0x100000000}, 0x10}, 0x70) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={0x1}) accept(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 07:38:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 07:38:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e000040000000000000000"], 0x5f}}, 0x0) [ 715.915605][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 715.939627][ T9322] FAT-fs (loop3): bogus number of reserved sectors [ 715.959747][ T9322] FAT-fs (loop3): Can't find a valid FAT filesystem 07:38:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001a00e5ef007b5a6e9846e9cc94c3", 0x12, 0x0, 0x0, 0x0) 07:38:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) 07:38:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000759d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e000040000000000000000"], 0x5f}}, 0x0) 07:38:29 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0xffffffffffffffff, 0x100000000, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000007c0)={0xffffffffffffffff, r0, 0x0, 0x1}, 0x10) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff51) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) r3 = socket$kcm(0x11, 0xa, 0x300) recvmsg$kcm(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="0100c8305046e7d05abd0500aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaeaa316da"]) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f0000000100), 0x4) close(r3) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9508, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'lo\x00', 0x8412}) close(r4) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) close(r4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2d, &(0x7f0000000000), 0x4) 07:38:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f00000004c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002c40)={[{@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}]}) [ 716.143610][ T9347] ISOFS: Unable to identify CD-ROM format. 07:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 716.250841][ T9445] FAT-fs (loop3): bogus number of reserved sectors [ 716.269254][ T9445] FAT-fs (loop3): Can't find a valid FAT filesystem [ 716.285349][ T9347] ISOFS: Unable to identify CD-ROM format. 07:38:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f00000004c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002c40)={[{@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}]}) 07:38:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@dmode={'dmode'}}]}) [ 716.497022][ T9456] FAT-fs (loop3): bogus number of reserved sectors [ 716.504895][ T9456] FAT-fs (loop3): Can't find a valid FAT filesystem [ 821.699167][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 821.706156][ C0] (detected by 0, t=10502 jiffies, g=57333, q=33) [ 821.714172][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 10503 (4295019275-4295008772), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 821.727509][ C0] syz-executor.1 R running task 25768 9327 9929 0x0000400e [ 821.735390][ C0] Call Trace: [ 821.738659][ C0] [ 821.741503][ C0] sched_show_task.cold+0x2ed/0x34e [ 821.746690][ C0] rcu_sched_clock_irq.cold+0xac8/0xc13 [ 821.752228][ C0] update_process_times+0x32/0x80 [ 821.757233][ C0] tick_sched_handle+0xa2/0x190 [ 821.762065][ C0] tick_sched_timer+0x53/0x140 [ 821.766813][ C0] __hrtimer_run_queues+0x364/0xe40 [ 821.771992][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 821.777657][ C0] ? hrtimer_sleeper_start_expires+0x90/0x90 [ 821.783619][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 821.789322][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 821.795372][ C0] hrtimer_interrupt+0x314/0x770 [ 821.800300][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 821.805828][ C0] apic_timer_interrupt+0xf/0x20 [ 821.811091][ C0] [ 821.814016][ C0] RIP: 0010:native_queued_spin_lock_slowpath+0x132/0x9f0 [ 821.821021][ C0] Code: 00 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 0f 85 37 07 00 00 48 81 c4 98 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 f3 90 73 ff ff ff 8b 45 98 4c 8d 65 d8 3d 00 01 00 00 0f 84 e5 00 00 [ 821.840604][ C0] RSP: 0018:ffff8880579577e0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 821.849080][ C0] RAX: 0000000000000000 RBX: ffff888055214688 RCX: ffffffff8158f457 [ 821.857034][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888055214688 [ 821.864997][ C0] RBP: ffff8880579578a0 R08: 1ffff1100aa428d1 R09: ffffed100aa428d2 [ 821.873127][ C0] R10: ffffed100aa428d1 R11: ffff88805521468b R12: 0000000000000001 [ 821.882098][ C0] R13: 0000000000000003 R14: ffffed100aa428d1 R15: 0000000000000001 [ 821.890090][ C0] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 821.896418][ C0] ? schedule_timeout+0x4d7/0xc50 [ 821.901424][ C0] ? __pv_queued_spin_lock_slowpath+0xd10/0xd10 [ 821.907640][ C0] ? usleep_range+0x170/0x170 [ 821.912470][ C0] ? mark_held_locks+0xf0/0xf0 [ 821.917213][ C0] ? release_sock+0x156/0x1c0 [ 821.921874][ C0] do_raw_spin_lock+0x20e/0x2e0 [ 821.926964][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 821.931882][ C0] ? lock_acquire+0x190/0x410 [ 821.936538][ C0] ? lock_sock_nested+0x41/0x120 [ 821.941454][ C0] _raw_spin_lock_bh+0x3b/0x50 [ 821.946196][ C0] ? lock_sock_nested+0x41/0x120 [ 821.951112][ C0] lock_sock_nested+0x41/0x120 [ 821.955855][ C0] sk_stream_wait_memory+0x83f/0xfc0 [ 821.961119][ C0] ? sk_stream_kill_queues+0x520/0x520 [ 821.966558][ C0] ? prepare_to_wait_exclusive+0x320/0x320 [ 821.972347][ C0] ? __phys_addr+0xa4/0x120 [ 821.976864][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 821.983102][ C0] ? tls_get_rec+0x4a1/0x590 [ 821.987671][ C0] tls_sw_sendmsg+0x673/0x17b0 [ 821.992419][ C0] ? tx_work_handler+0x180/0x180 [ 821.997343][ C0] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 822.002888][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 822.009112][ C0] inet6_sendmsg+0x9e/0xe0 [ 822.013511][ C0] ? inet6_ioctl+0x1c0/0x1c0 [ 822.018082][ C0] sock_sendmsg+0xd7/0x130 [ 822.022485][ C0] __sys_sendto+0x262/0x380 [ 822.026975][ C0] ? __ia32_sys_getpeername+0xb0/0xb0 [ 822.032681][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 822.038904][ C0] ? put_timespec64+0xda/0x140 [ 822.043646][ C0] ? nsecs_to_jiffies+0x30/0x30 [ 822.048490][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.054726][ C0] ? __x64_sys_clock_gettime+0x16d/0x240 [ 822.060344][ C0] __x64_sys_sendto+0xe1/0x1a0 [ 822.065089][ C0] do_syscall_64+0xfa/0x760 [ 822.069575][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.075446][ C0] RIP: 0033:0x459829 [ 822.079330][ C0] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.098910][ C0] RSP: 002b:00007f2ea80cec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 822.107301][ C0] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 822.115338][ C0] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 822.123378][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 822.131418][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2ea80cf6d4 [ 822.139371][ C0] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 822.147430][ C0] rcu: rcu_preempt kthread starved for 10546 jiffies! g57333 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 822.158589][ C0] rcu: RCU grace-period kthread stack dump: [ 822.164454][ C0] rcu_preempt R running task 29464 10 2 0x80004000 [ 822.172336][ C0] Call Trace: [ 822.175612][ C0] __schedule+0x755/0x15b0 [ 822.180008][ C0] ? __sched_text_start+0x8/0x8 [ 822.184843][ C0] schedule+0xa8/0x270 [ 822.188981][ C0] schedule_timeout+0x486/0xc50 [ 822.193813][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 822.198728][ C0] ? usleep_range+0x170/0x170 [ 822.203384][ C0] ? trace_hardirqs_on+0x67/0x240 [ 822.208558][ C0] ? __kasan_check_read+0x11/0x20 [ 822.213579][ C0] ? __next_timer_interrupt+0x1a0/0x1a0 [ 822.219107][ C0] ? swake_up_one+0x60/0x60 [ 822.223592][ C0] ? trace_hardirqs_on+0x67/0x240 [ 822.228600][ C0] rcu_gp_kthread+0x9b2/0x18c0 [ 822.233341][ C0] ? rcu_barrier+0x310/0x310 [ 822.237913][ C0] ? trace_hardirqs_on+0x67/0x240 [ 822.242915][ C0] ? __kasan_check_read+0x11/0x20 [ 822.247920][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 822.254138][ C0] ? __kthread_parkme+0x108/0x1c0 [ 822.259137][ C0] ? __kasan_check_read+0x11/0x20 [ 822.264145][ C0] kthread+0x361/0x430 [ 822.268194][ C0] ? rcu_barrier+0x310/0x310 [ 822.272776][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 822.278997][ C0] ret_from_fork+0x24/0x30