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"}}, &(0x7f00000012c0)) clock_adjtime(0x0, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 02:16:22 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000300)={0x0, 0x5a00ff1687269fe8, 0xfa00, {0x1, &(0x7f00000002c0), 0x0, 0x1006}}, 0x20) 02:16:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:23 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000300)={0x0, 0x5a00ff1687269fe8, 0xfa00, {0x1, &(0x7f00000002c0), 0x0, 0x1006}}, 0x20) 02:16:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x24) creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) clock_adjtime(0x0, &(0x7f0000000040)) 02:16:23 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000300)={0x0, 0x5a00ff1687269fe8, 0xfa00, {0x1, &(0x7f00000002c0), 0x0, 0x1006}}, 0x20) 02:16:23 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x105040, 0x0) r2 = getpgrp(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0x1360, 0x2e, 0x400, 0x70bd28, 0x25dfdbfb, {0xb}, [@nested={0xac, 0x1, [@typed={0x8, 0x66, @pid=r2}, @typed={0x8, 0x3c, @u32=0x8}, @generic, @generic="b0c6f64efb1be66734191d44e4afc445749d2a1ee971709f50da57944da2155016eeb083ead400275499fa715b8e282e6f046ed844a5a92f5e4361d8cf91a950b11ee21c27323ad9ac7bf649d6bd164c1d0033f731065ed3918b8cb4c3849b1827438d75605f40e5e10a313150ea9d27f0b551bb70acf7da756ef84d738520bd0ee55ea834", @typed={0x8, 0x15, @pid=r3}, @typed={0x8, 0x87, @fd=r0}]}, @nested={0x118, 0x5d, [@generic="a4135d583281815a144df95619", @generic="24848c9b84ead32c8e1ac585d4f773ed8ed76b4893533a6ee1f2785ddc990c91dd7bcdbdf9355c175ece49a07f85a4b3fe26f955fa1099daa5451369c2d50dad69cacad9", @typed={0x4, 0x38}, @typed={0x14, 0x1, @str='trustedtrusted[\x00'}, @typed={0x4, 0x73}, @typed={0x8, 0x4d, @u32=0x2}, @generic="22e22d2aee54936b72e6889db6574d336230200faec7bdc4c91dab180ece8af3e8d131dc99ab77dcf9d3fd85692f7b45e33dee6ed63d8f1fd3073bdac61c8e79a553376b2028ccfd729e3a67a8d0", @typed={0x8, 0x8b, @pid=r4}, @generic="8c2a8c91b42294bdc3a5135a33cbe2c72305c5843d36f0399cd9786a72022651e903148a09ed11605885097a198556889a57c1f526d754e0a1f6e6f8feb036de6e0fec65793804"]}, @typed={0x4, 0x8e}, @generic="5868cc2eb01166258f747ac0f1e07d72943030e4c77cf89d1cd7d9df39e7b672cf695334c190ef623290ec4d3736e8b8af5133039d83e28505bc7e8cf1eb2e9cc8c9ecec5af17da9f95c57d51d095df09703a4535a73bcdd87bec35f2eba378106d84f5fce581fd2", @typed={0x4, 0x80}, @nested={0x118, 0x32, [@typed={0x8, 0x2e, @fd=r0}, @typed={0x8, 0x10, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}, @generic="337c65da2496a44117476ac5ec31ed09a2b5ae4916e75597f1b067372ad1c57905a277aa91e719c6c32278a4e5bf7fa54bbe1eedc8cbab5099ddbe5974a434763c862b053f5aa9810d4f5f7fe912d3c90dba14d0db8480885a704af7f0ef7363267c5d5c9eda274dec9b3e430cdb6d4705727fa9b5c2db27e25acc4a742f32811ed34f39aff3158b4432c0d31156991cfd63c6833b5da395e14f8615c359a57e7a24a37e7c0be9bf15f516e0bf1e114d5c08bea927d125e04bbba391fc2e9e0f55fb165e580130dd4a986edc7eb3946b2d2af994", @generic="e15193c19ff8ba208ef5e8ebb81d950260bd595e4866d3a260dd4c19d5", @generic="d39d4ef9cc953b4231ef3af398358013"]}, @generic="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"]}, 0x1360}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) close(r0) r5 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r6 = gettid() fcntl$setown(r0, 0x8, r6) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r5, 0xa, 0x21) inotify_add_watch(r5, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./control/file0\x00', &(0x7f00000000c0)='9p\x00', 0x2100001, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 02:16:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x6, 0x4000) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20, 0x6, @ipv4={[], [], @multicast2}, 0x100}, 0x1c) ptrace$getregs(0xe, r1, 0xad3c, &(0x7f0000000140)=""/63) [ 1363.086993] audit: type=1804 audit(1545790583.326:51): pid=31485 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir796658856/syzkaller.gsfPxg/243/file0" dev="sda1" ino=17105 res=1 [ 1363.166808] audit: type=1804 audit(1545790583.326:52): pid=31489 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir796658856/syzkaller.gsfPxg/243/file0" dev="sda1" ino=17105 res=1 02:16:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x400000) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x2) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req={0xfffffffffffffffb, 0xfff, 0x401, 0x3}, 0x1de) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x200000000) 02:16:24 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000140)) 02:16:24 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000140)) 02:16:24 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) kcmp(r2, r3, 0x7, r1, r0) r4 = gettid() fcntl$setown(r0, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}) 02:16:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) ptrace$pokeuser(0x6, r1, 0x5, 0x5) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x8, 0x200100) write$P9_RSTAT(r2, &(0x7f0000000280)={0x6d, 0x7d, 0x1, {0x0, 0x66, 0x0, 0x7, {0x3, 0x0, 0x7}, 0x40000, 0x1, 0x3, 0x0, 0xb, '*ppp0eth0lo', 0x0, '', 0x19, 'wlan1cpusetlovmnet0em1em0', 0xf, 'em0$\\security^#'}}, 0x6d) getsockname$unix(r0, &(0x7f0000000140), &(0x7f0000000000)=0x6e) 02:16:24 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="db605aa7c2fb2b36fbd1760fd658c203953b1df1f5c0a8cdfc94acb324210a08462ff00e553dc0cf961683284da99dda7a4f14efb0dc87120ae5e406ee3aa0080e9073bb5a5bb415f65e372b5293219a8966d133f15c200c6f056ae392bf53b05621e4ebeeefddd7fd0968457b941ddcc2a112f2aa5a1e3d7036f3f66c8825b6c6831cacc5b4ca5dfbacb0266838d709dce6b255499b8644b9d129a7627c1c567ec9f6", 0xa3, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, &(0x7f00000001c0)=""/217, 0xd9) r1 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:24 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) 02:16:24 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) 02:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:25 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000080)='./control/file0\x00', 0x100) 02:16:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) clock_adjtime(0x0, &(0x7f0000000040)) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000001c0)={0x932, 0x33118444, 0x1, 0x201}) 02:16:25 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) 02:16:25 executing program 2: r0 = semget(0x2, 0x7, 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) bind$tipc(r1, 0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000140)=""/76) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x5, 0x9, 0x2, 0x0, 0x0, 0x4, 0x200, 0x2, 0x4, 0x0, 0x9, 0xfff, 0x1f, 0x3, 0x6, 0x7, 0x3ff, 0x46, 0xd0, 0x5, 0x6, 0x6, 0x6, 0x55, 0x4, 0x7, 0x7, 0x1000, 0x1, 0x1, 0x6, 0x100000001, 0x8, 0x0, 0x7fffffff, 0x6, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x200, 0x4, 0xffffffffffff1262, 0x6, 0x1, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/61) clock_adjtime(0x3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x800, 0x3, 0x9}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x400, 0x0) syz_kvm_setup_cpu$x86(r3, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000380)=[@text32={0x20, &(0x7f0000000340)="27c4e30d02ca04df49e966b8e2008ec88fe908951e0fb452e126660f381d4759c4e27d136f0066ba4000ed660f158600000000", 0x33}], 0x1, 0x24, &(0x7f00000003c0)=[@flags={0x3, 0x3}], 0x1) ioctl$KDENABIO(r1, 0x4b36) 02:16:25 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) 02:16:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8, 0x2, @thr={&(0x7f0000000140)="e94ed83d4cb6ad2e515928ca18f70e0d21b9eaa13535d1c033c856fa42e66a4ec17a2a34740e73c78d6860336a2a07e3d30347b4d8f1eb255cc5d8e7a667c2b3caa87cbdf6d7ad79f4eae4e4fc177bb5185aa071b739d89309aa14fc0168798f3f60ca7cbb6a5301cc13d4a3876dbd9627a233e65006cb4c3e141c2da11879053a6f11d3633aa67551f652bee4bdb6a20c25cf4f62c478a0ac1b0476221e910f5f930518283617685bded3357be48a64fae7991eddd2cf3e6c675a962c425782bc7ac5928b5a2ef5525edf68d6e94c67fd24796b77519e26f2c8c578a30d5e6e07a70a424e490c8d3b49ee25ecc3a4613bc42f47940a", &(0x7f0000000280)="145cf72cac4a738b8ffb60a8b6e8a0fef42feedcaeb41265923d32fa4635d0c2b69a5f8153b475592cbae8c0317771f9a960e5a6680f801712b686f18b78323bee2de4e4fa26"}}, &(0x7f0000000340)=0x0) timer_settime(r1, 0x1, &(0x7f0000000380)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000003c0)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000440)={0x10000, 0x8, 0x9, 0x0, 0x0, [], [], [], 0x11, 0x7ff}) timerfd_create(0x2, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101900, 0x0) 02:16:25 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) socket$inet_sctp(0x2, 0x1, 0x84) 02:16:26 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x200000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x2a8, r2, 0x402, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe01}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x47b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc1bd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff0a29}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdd6f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x191}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6e1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x911}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xebb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x10}, 0x800) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080)=0x7, 0x4) 02:16:26 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) socket$inet_sctp(0x2, 0x1, 0x84) 02:16:26 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$peek(0x3, r0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) 02:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:26 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) 02:16:26 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x40) stat(&(0x7f0000000100)='./control/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080)='9p\x00', 0x2000, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6e6f6465766d61702c6163636573733d4ef18179a623eff24ccd0b5094100bea67fc8872bf7b8a3390ea826d8be21e47ea83a2b77f4b6bd7af916f2d64b01659276569cfeec6c209078a61588d2b6fd7a13d5d21a9a21b40fc3a6e4c9fe7eb9a008625fc895b0d5fb0e485c1c6f362db3a37402d1c", @ANYRESDEC=r2, @ANYBLOB=',dont_appraise,\x00']) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r3 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r0, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x1, @remote, 0x42ba}, @in6={0xa, 0x4e21, 0x26, @loopback, 0x4}, @in6={0xa, 0x4e24, 0x7, @remote, 0x3}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @empty}], 0x84) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:26 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x1de) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 02:16:26 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) 02:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:26 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x80001) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0xfffffffffffffd52) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfff, 0x4, 0x7, 0x4, 0x0, 0xab8, 0x4000, 0x2, 0x2, 0x4, 0x2, 0xffffffffffffffe0, 0xffff, 0x1, 0x7, 0x6, 0x5, 0x6, 0x3, 0xf434, 0x8, 0x4, 0x1, 0x7ff, 0x8, 0x5, 0x3, 0x2, 0x1, 0x401, 0x4, 0xfffffffffffff000, 0x2, 0x6aac, 0x4, 0x8, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xc, 0x6, 0x1, 0x8, 0x67420486, 0x1b45, 0x1}, r2, 0xc, r3, 0x1) fcntl$setsig(r1, 0xa, 0x21) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4200, 0x0) ioctl$VIDIOC_ENUMSTD(r4, 0xc0485619, &(0x7f0000000080)={0x5, 0xc000c, "75d50e193140a8b27ce00029ed9d3244e47b3cf0cd5dadd7", {0x0, 0x4}, 0x1}) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x101) 02:16:28 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) uselib(&(0x7f0000000000)='./file0\x00') 02:16:28 executing program 2: socketpair(0x11, 0x80802, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000140)={0x49, 0x2, 0x81, 0x40}, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) 02:16:28 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:28 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:16:28 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:28 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) 02:16:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000280)=""/21) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xfffffffffffffffb, 0x20, 0x9, 0x288, 0x0, 0x4, 0x0, 0xc, 0x2, 0x3, 0x0, 0x9, 0x4d72, 0x6, 0x2, 0x6, 0x5, 0x6, 0x7, 0x385e, 0x4, 0x4, 0xaa13, 0x3d7, 0x7fff, 0x4dc, 0xe6db, 0x6, 0x3, 0x5d1, 0x6, 0xa18, 0x7fff, 0x4, 0x7fff, 0x100, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x100, 0x81, 0x4c, 0x5, 0x5, 0x40, 0x1}, r1, 0x3, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f00000001c0)={0x8, 0x6cb3}) 02:16:28 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xffff, 0x800) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x208040, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x4, 0x240000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000003) clock_adjtime(0x0, &(0x7f0000000040)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x400000) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 02:16:28 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) 02:16:30 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:30 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x5) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0xc0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) clock_adjtime(0x0, &(0x7f0000000040)) 02:16:30 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:30 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) 02:16:30 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x400000) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000540)={0x40, 0x1ff, @name="731d869faf982c782ef4e8b5b70b5a39aaae10081815d40da110569e84315385"}) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r2 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) prctl$PR_SET_TSC(0x1a, 0x1) gettid() syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000005c0)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x20, 0x0, 0x0, 0x0, 0x400000000, &(0x7f0000000580), 0x89a, 0x4, 0xfffffffffffffdb5}) fcntl$setsig(r2, 0xa, 0x21) writev(r2, &(0x7f0000000480)=[{&(0x7f0000000080)="ea328a5814e2e855c7bcf5f1421f6b67649eaf62079a3d5558cda43fc548f617f375d7764d", 0x25}, {&(0x7f00000000c0)="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", 0xfc}, {&(0x7f00000001c0)="7ea228772a8e86da3b1430ce74bd8251fea45265770241562a5032b8fb808a95004139f8f9dca3f1a4e50c5654e5eb4cfea6db411f43f516ffc51fe7c925ba7a3ccdbea0fb44b4c636", 0x49}, {&(0x7f0000000280)="21faa53fcbedf572a090cac357598507ea6378368f90829e75831eafa2e3ae436c751e3ffcf4ac4ec90358ab46f085f0a4fc5269f6", 0x35}, {&(0x7f00000002c0)="e744bfef598600312d157e65129edbdc919677676a8a4af696690425b444a0e7b005a2c9e50dd06e40d7e142834de312679b04ac2696182df3fe64b66253cd049b92303914aa91e671bff532bdc14ef69cd4b66a94e19d78a0df04ff61a0496f3542e252264db3f5e4cbc431437c459220b52348953aeb844b3ed2fa4f662e6956c40db4b57445ae7592dfc55c70045249152b165a46d36e72b52071ffe6ea1a9fff57f9871963407c798944ed540112cc7ec0c9dbd670656b36cd4014bb9bcd833eaf5d7b9e7582", 0xc8}, {&(0x7f00000003c0)="10d30a72fd66433bccb9acc38f8261bca2f500e52e5e1e5a33592379393548ba9cb1f402b58ac894604e7e5631feed402a365ba468623d2b61ca0159a595f4882870d211bd1abef59d8dfdb01e78ab5eb64ac54fb44f7ca778f3cd306632208ea58b2f", 0x63}, {&(0x7f0000000440)="4e9873", 0x3}], 0x7) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfff, 0x20000) r2 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)={r2}) 02:16:30 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:30 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:30 executing program 5: r0 = userfaultfd(0x80000) r1 = dup2(r0, r0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000001c0)={0x2, 0x0, [{0x2, 0xad, &(0x7f0000000000)=""/173}, {0xf000, 0xd1, &(0x7f00000000c0)=""/209}]}) 02:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x7f, 0x8400) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000140)) 02:16:31 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x44592059, 0x7, 0x7, 0x7}, 0x1b) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4601, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000000c0)={{0x5, 0x6}, 'port0\x00', 0x4, 0x448, 0x1, 0x8, 0x9c5, 0xffff, 0xffffffffffff0000, 0x0, 0x1, 0x1}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x68b}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r2, 0x69}, &(0x7f0000000240)=0x8) 02:16:31 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4(r0, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000000)=0x80, 0x80800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000400)={@ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, 0x6, 0x1, 0x1c00000000000, 0x100, 0x200, 0x80000000, r3}) clock_adjtime(0x0, &(0x7f0000000040)) 02:16:31 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:31 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) shutdown(r0, 0x0) 02:16:31 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) r1 = inotify_init1(0x80820) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x806e) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x20, 0x1, "ccf0461e9baeaf36647839b7d9472c13bf9047704f433a1a68cd9a6e00492df1367566c0b6937bf87699ff76d54c3f81668f55f432182ef89a45d3a3023517", 0x2b}, 0x60) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000001440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001400)={&(0x7f0000000380)={0x1044, 0x11, 0x6, 0x100, 0x70bd27, 0x25dfdbfe, {0x3, 0x0, 0x4}, [@typed={0x8, 0x3d, @fd=r1}, @typed={0x14, 0x81, @ipv6=@remote}, @nested={0x1014, 0x95, [@typed={0x8, 0x2b, @uid=r2}, @typed={0x8, 0x18, @u32=0x6}, @generic="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"]}]}, 0x1044}, 0x1, 0x0, 0x0, 0x10}, 0x40) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) 02:16:31 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:31 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r1, &(0x7f0000000000)={{0x3, @netrom, 0x7}, [@netrom, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x40, 0x40, 0x8001a0ffffffff}, @netrom, @remote, @bcast, @default, @default]}, 0x48) 02:16:31 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:31 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1371.698102] ax25_connect(): syz-executor2 uses autobind, please contact jreuter@yaina.de 02:16:32 executing program 2: 02:16:32 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:33 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:33 executing program 2: 02:16:33 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:33 executing program 5: lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000200)='security(:()system\x00', 0x13, 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0xb3, 0x8002) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0x200}}, 0x5}, &(0x7f0000000340)=0x90) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x6, @local, 0xfe8}}, 0x101, 0xfffffffffffffff7}, &(0x7f0000000440)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000480)={r1, 0x0, 0x5, 0xffff, 0x8b, 0x8001, 0x1, 0x7, {r2, @in6={{0xa, 0x4e21, 0x101, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100000001}}, 0x74, 0x5, 0x0, 0x100, 0x1}}, &(0x7f0000000540)=0xb0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400240, 0x90) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000040)=""/208) r4 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000140)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:33 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r0, 0xa, 0x40000000021) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:33 executing program 2: 02:16:33 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:33 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:33 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x169000) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000080)={0xfffffffffffffff7, 0x7, 0x2}) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:33 executing program 2: 02:16:33 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:33 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:33 executing program 2: 02:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:34 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0xff, '@ZU', "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"}}, 0x110) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f00000000c0)={@remote, 0x0}, &(0x7f0000000100)=0x14) bind$packet(r0, &(0x7f0000000140)={0x11, 0xff, r3, 0x1, 0xfffffffffffffffe, 0x6, @remote}, 0x14) 02:16:34 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x376) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0xa4000964) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:34 executing program 2: 02:16:34 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:34 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:34 executing program 2: 02:16:34 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:34 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:35 executing program 2: 02:16:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:35 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:37 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) fchmod(r0, 0x1) r1 = socket$packet(0x11, 0x10000000003, 0x300) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f00000000c0)={0x1, 0x0, [{0x1, 0x4, 0x0, 0x0, @msi={0xfb39, 0x2, 0x1c87}}]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000000)=0x2) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000080)={0xe5000000000000, 0x7ff}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:37 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r0, 0xa, 0x200000000000021) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x801, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001280)={0x0, 0xffffffffffffffff, 0x1000, 0x8, @buffer={0x0, 0xb7, &(0x7f0000000080)=""/183}, &(0x7f0000000280)="f2a6fb89579e6ec3c8455f4b040b52b74ecbb2b80378bdb358ecec6e77b2a23063065d889afd9ee7cc58ee4205cb0fdffdba7a52f8950fb5c041e0e42b4ffa6bdf20025cb5cfc99b6dd8882e6042cf682cd9513d9b3dd94c36b633d5c0e12a896e960e9f4d99234bb10a628447081338c45805a3814cbaad2b2ad1088cfcbf0d8bad0ca82bf064bf6430bfff11d2c09177e7c10cebc2659e04ac7e30e3ac84f6034a94dd9ff36432df1e9fae61bd3e45d7980fa72e29a291c5c21edddaead3d82f2e2245ee1e30949bb3b14b7fd6da3f6abc4eb0ff263596f705d72e992eddb1bae82a7bf39be5e0c01c9eb97d5cc7828c6e984c9f1cb93b089c720a6d53fd8211f5b551c7f2b091cca5a892dc8282583258ad1ad0000ed88664ce61b5d14d483113cd0ece7065af33969fa43fb198f066122fe01f501ffad2efa7fe0743b86b1dca5ca5e4858e5c95fafee9691ed849a25ac3eb5533e99a68d8163610123e5105b9c56fb47c27538484bbe691062990e7a0378424d225fec06acb403f25f200355687bfddc7a78f5742150c475c0e5bd1370560d352da4de330802fc50700349f79b745397469996f1dca695a87edbbe64864d4dc716b384da9c9f6cc97cc0c82e6ba0de28623ce758d24e441430d1ea8acf948a854ddcb5f129c1239ff90a742810b8218ed0b6969c93239ec407dd7c9f0102a11f514d15fdfd8d0c8fba85d439a297606b98e38d37f02e7e14009b92b3b6e9bd63514cd4b1f326f68ff1bb060d5f0ef4dc23a65b308f58a21e0ec86da808e39ffc67bcb4292da51bdb135ef72dfa4ab8904bb363c88d7275147c738e711ba4666b0fd0cf4b406b5425340caef9de41a89c3f7b1e0c7241a4163ca8c1db871c9e7722f7f4071f2329833378c974428d181c3b9f156afadd00b4f05efbbb0a97f54ed7c68d13827405b41c7ed7bd393bb2f9dee48256b5fe17294702d0df0b6528312c1a04fa3f38b4a84115b52f5e8b26effbc1d43af2e10fee0d0916588893b5a9c334ff94696b0e1015099cbb55425380c1342fc1f12aee4fa90078f048ef6447d8b1016e7fa15e6713680215dcdb01d7628f3effe8e3a8d06417ff6534258a0a94b54fbf15dddd2b41939e84d805cba06c9b081fc6ab246433e866cae86ef158359316a8a368fb8ff91a76f04fb81d4e4a73be7e04c57ae8433c15e0b2c43c8433fc4d3af92447a4ec9d92d9d6282391742c9b29d46e338c4ac72229db7b51a989c7d15ae29d9eb8fabfba0eac740394d226316e01532e431239e9fc7244822a0bd8be1fdadb514c4ba23ba17568d04e3491262cf21905e338b6a483fbee9ef183756213ca16ff3b0e676e6d35f6bceab6545240a8984917415f8fb8a790d8494fe7d880ff06d36f0e006e7ec476702012c8b920e52de0cf05c21d1d1162877135af7727d4ed7b6e52e3080464ac86bae16fb2ee151549dd32d1cc98532a92188ae759db8f45ad25a12c365b06024dec477c0e21fd69e20e0d2c1e5e19628b098d228c21e0fa4b1d7eb810877319edc21edc2fb9cc423cf36d65b977f2f0d77e8b5061bc0b0145356e2775c888133fd577c1343d69673858308f4149c3839b74de58de8e50dafe253740d47138c057754fd4f860b394bb9d816857b2e24c607b41864f5f032d2e31920967d4372ae4cded7fa14b825fefcdbfda234745ebc3e01ef3ec6698564e49efd7b072c5948ade6ca171e4556e3d3be3d032e589c47defe2ba6b6173d21b8c900ad3d245cfad03d85552c36dffcbd3be09bb6916c9b547f69fdc3ba4ead20d4ded8f5658c46c5655b8062d15ec06b26123c203799ceda2c4e659e216c9bd8ae2f7f11b137a0a9dea6f225cbc9f23aa3eb784befebbac11214700678cfb79f70799e773906ce35c4dacf48d5ccf39e42de7b85966e761b683103aaf5b2ab9405b6f7b8642f4c839fdca405a9fa3e1a94d5d8ca9fe122dc48ab7704a0b368289ebdf04295f9f34080fe6689539754f321d9e1bccd02a289d18668dabd9af24a4b80858a77b0f8aaaef000444248e05717db7ea1a9863af28ca2aaa9a6fd9f4dc6b52b4097f797d481cba1dc0d4cbd2890112019bfe174e14964e0c6481f42737eb9deeef698d69400624286cb492252db679f74626c7e9b8ec96753d9ebf4c0785f9bb30c1e717f9e91cbcde54aace0ac3e2618b44e7b5ffdbc7cbc04415271529df90f7fa2687a4071727028a6fe0feea72b0a8bbebb34a85b2e011639ffe31ba9d3649356eebcee9ea77e5957dca7fc924a6f8d617ee190bc4d4c96ac82d9cd725fc2d05ed924326460e5fb494f7ec1227f7dea0e51d532157a5cf904cd982d573b882bc3c0e754098d96da3fd448fb5fa2d2d8bdaa8b13a9c08498f7482bdfa2e159ed6cdfc3769482049ee0692821a71705b98427e160b40bc1f5569b37398e380723dc83916f9fe5813f1a822256bbcac779d1aee5b90fb386eabc2e109c9e5933a5c559c9df98eaebff94d91b8904350c12bca08aad645733b99e2d3c7372e4e3e611b95c7388dd2078d7e7d0bd1b930f11c95d736fdc583552492f4bde27465371fdfc612915dbc213e81410af55cc51acc78167a5e62889ae495ec7109be54f66868ef9bafd8764e112f73bc4b75f64d12eaa6e25eb6261cd0777b085d588affbd327e43c101e1faa5718a9ec0992965c9e390673980381519722fdae413431b58bb82f7b243a4525ec3f7084a5a32a74e685d2fcc410066692df45c299d6dcd9a7f36e66e2f195518c968a0a5a2878c7648747f57a3e77b64a756fde195f7c350608c7be04b9b5bc33702f0d1158d7e846b9cc3ce6a48634a84220e046fd5fc06c112fe32099071d3eb04fea7d5a2735484e2a4f4772a786f2df259b0f8fadbd0b674e7baea99a7b99f54517f2138e69210445ff1e31841d1725ae85e95b2b06a89dde3e10b965810f72c05dfe400534e5de46c60adc24e1555b93ca8d44c2ea825c81c9e76df3d3d09c3a2fb00f47bce5211cc32151604fd5d36f9a5f6a6c8343ae49fff1b847ac79e823efaced3cfe763225a1b9cd2360fcc96a46e5191239c4187978e6092b2850a711a5d94bbfef71bf608aa926517f25d05a19570a368162a27370a343695d433adcd70d08633e5788832ab32e8842d36663fc691df8d7a189baab55603ac105c937915e964a8b86db3add3861b3b989cc9e87489a849ba82d0dd5ca7d7ec508f13d808219d61c6af824d9a3a532ff666a8ff2cbd64793140bc5bed14c1188f01a00ccb3154932e4edc703866f9ef016d12fd34ff9376bedb273e5e59f719ea03a7b694fb0d4fcb58d57eef297a322b01f0e5eb631e6cb8eaebedfb0f6dcb8ba71e598009a567e8a0d09e6211a2692010d10ad1493f659754195a5a141c93837a5918b2d6f7c35e1b61d2657270a91dbc5c64b35ff5f39fbd85b3a7c7be00c750d78c01236c5daba2cbe60a06fb7758718b8ac8a29b2457e6a795e110e08637660941279bcdc652cd1c85fd3041070d5f3c0b260bc0337663cc59449d2d9e05a7c526d8f00799710a8fc52afd7b1d1e4037779c58f4cd543b6565f187e87a0f8f950432a730e6a207a2ad2e5d0e411a54db3d6575ff27d10d95e06ca39f6bf95f074ea1a449eac1b5c0140fc49025cfe5ff8192b304a4f3aacacccbd3b2bd26146de402c27e17d25b9ef5a896bd319e1c11ac267ae71410de4707787fab5e2d2ff0a8cb8dd672e19b8fe0552587cce97df0cf427ad5762e5d988b78fbb96c087462402c0a3fd175dbb41b3d6255fe15de52b7ae6587624d3c0f52edfbda81a039b22c58b3a344518419e6516a15c366709d80504d42048363cf5a6ce94438812c24768bbd2e597679b2e9bb0725ede36e6faf47de53f1f1375d0ba181ab08a59f8e36ca09cbb7a698bdd7f616d33d6a9c4c33786a13a3eb08920e25bda000279f5a951c5847ebd94a440008669fead705312a84e60f4710c94ebcd164f2e274b8125c0dfba9d4a0694041235537cca25f9ecde07131b3f35d50857a0370b082535f157b075bbd12a7489e52e71f5b49effcd27dbb0c289ab328fbad80731dc0b1e419ddb3dcbdb3932bd141db9f91b4c62f1d66200707c3adf76d05163e06ce897abc00970e03c4faddd0f272dabad91b61a74fbf80eebcad1a0265248c4ff1cd84f7a2abb552bb22aaee8c583df583a12fad8f77206c2f4d7204f5bf35916a84ca1d89f5b53ab56402216c1f4264495226f5cfcb22b5bd9fc40cfdd79aa9684c8712863f91a21d6319b28e123ac8c501f44186cffd6b653c5c55afa4279a9e32285d56e4c7bf56a6feac152134f871a31a1337a77cafd270e02520e8ecc750d05668c642ac62042d4f4bed227bf031b0b34867de2f20386cc284ee40e34d64777667cde81aa2be83128b72e5208ef0c9caeb6e6fc4bff8781d4a163b611eeadef43f89ae91ae304d505748bbd19d62abff598fccebbdbb59739884e13788f0bc14d0c1a01ac8bd83b20731954bfdecce1b1d7f054c01ae8fb799a4b52000cf370f7469bdc7533a5ba2b29912662a5c1369bb6299cfc621023a235e27b66b258449eb2b65ea01f7bf2dc72a7d8c1f1f6b441c986f6bd3885dff8b1d257b5ae8aba2430fffaca88161aaf16f43c5b077caf425881da1eede1cb5f7ae58a3daf2872e4cf53a145eff8f22bdcfb5779e1b2bb2789a98e95b2315f15b856959c6249629a5d05600e319856aab2c46d6c035c08f9e371a44ada95138f0cd983b119fcfe78d422395d5b8f644b8abb18e4dd9b0aafed1d19bf5bb5081384922e5582e5b5ed743b65b9dfa3c7815a0a62638141c09891598f5b2778f0a31bc4b9e46458507fd4539a18c270b9a96edccade9d88f89f551f3541e161e192c1aa255ce514bd38614dac25ea8f72e0a80b40069f0cc198d2f75e65216634740431c2036dc402d477f4f5773595ce37bfeedb96b2144a1a00b326dadbfff1c32ed68845aa88a1754b3a66320de662ef1fdf7d044765a42f1f280de59459b640025eb93c77e0cb2a6d14d606d0188fb325fec5e278c2224bdc42596339c6184287d0556e212e5494c7e5fc3aebf25376d6ad7cda3284b9be961030bbe82dd825872c6e03f1cbce305ddd8bc5200b303c7030860f02384017e4d4f9efb12054be46cd35c1c8ff20df1d39990e2aca9fca6598e2b66fb387e868eb0662e1eea61a90e9d7d77187a84cfdbc1faf9dfc6cae764284bc006f8cd6fdb7459e9f8f98078e7d10a12515ef747ed6ca6129128998c113b3146881c3741e5d98abac6b6313445e1d2eb48e4fb932bc12416af76ba9ffc14a992e2cb99bd145b0d12ccdce5786d3666aa274615735015fb2b3162065dd839666118b3978669ffa811b0860fd3a71df8af8b85debcafb9e418a4f85dfd228c05efeae7b815309103916f4bac496a064773bbc60d4013ae279df2ca38be95f914664d6701e1abea235bfcbea05482e622b64eda8e9bd90dab9d102ddef1ac488757fa00d26b138fb79a7ec6aab22fb6e3538751d106a8519e9e7a34b31ba9d4617748327aa89acce4b3f8ae05720fb3444ffd24de5eec8fa37fb379859defd55da3479818bbda206f945b18b7988f9f49db8ffe760f93615a12d03da22c3a661ee3c30c5dc929796261632260e2bef6836fa1e6f37af8317784e74edbd1ea7c29f707527e112c1173ab95a9b876db9a6aef17eac8eef6b5e7241e6773d3351b104f39b13b7766b42411495a9e11002e07b7acec39bc512c5e5108de908097b787e97ba5030e32961", &(0x7f0000000140)=""/191, 0x3cf4, 0x0, 0x2, &(0x7f0000000200)}) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x8) 02:16:37 executing program 2: 02:16:37 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:37 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:37 executing program 2: 02:16:37 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:37 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='overlay\x00', 0x101800, &(0x7f0000000280)={[{@index_on='index=on'}, {@xino_on='xino=on'}, {@upperdir={'upperdir', 0x3d, './control/file0'}}, {@upperdir={'upperdir', 0x3d, './control/file0'}}], [{@obj_role={'obj_role', 0x3d, 'system'}}, {@uid_lt={'uid<', r3}}, {@subj_role={'subj_role', 0x3d, 'wlan0-'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vmnet0)self:cpuset\xc8wlan0-/ppp1'}}, {@obj_user={'obj_user'}}, {@smackfstransmute={'smackfstransmute'}}]}) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:37 executing program 2: 02:16:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:39 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x200) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000040)) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:39 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) 02:16:39 executing program 2: 02:16:39 executing program 1: syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0x7, 0x145201) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000001880)={&(0x7f0000000380)=@pppol2tpin6, 0x80, &(0x7f0000001700)=[{&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/112, 0x70}, {&(0x7f0000001500)=""/231, 0xe7}, {&(0x7f0000001600)=""/49, 0x31}, {&(0x7f0000001640)=""/134, 0x86}], 0x6, &(0x7f0000001780)=""/229, 0xe5}, 0x40000000) r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000001900)={{}, [@rose, @null, @null, @rose, @null, @netrom, @netrom, @netrom]}, &(0x7f0000001980)=0x48, 0x80000) r1 = signalfd(r0, &(0x7f00000018c0)={0x200028}, 0x5) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./control/file1\x00', 0x100, 0x80) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) fcntl$setstatus(r1, 0x4, 0x3fff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="0400d0b3aca7a480c7a52cb667c200000080000100008e2ea606dd4fe05ad63801dcfcb0ac1c322e07dfbfa2292467e39e7aac595a5efa11"], 0xc) ioctl$KDGKBTYPE(r4, 0x4b33, &(0x7f0000000080)) r6 = gettid() fcntl$setown(r1, 0x8, r6) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x9, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000140)={r7, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x6, 0x2, 0x1, 0x429, 0xff}, &(0x7f0000000200)=0x98) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f00000002c0)={@multicast2, @remote, 0x0}, &(0x7f00000019c0)=0xc) setsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000001a00)={@dev={0xfe, 0x80, [], 0x11}, r8}, 0x14) 02:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x200000000040a) sysinfo(&(0x7f00000007c0)=""/154) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000580)={0x1, 0x0, 0x0, &(0x7f0000000800)}) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, 0xffffffffffffffff) syz_open_dev$dri(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsync(0xffffffffffffffff) 02:16:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) 02:16:39 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:39 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffff9c) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r2 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r0, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./control\x00', 0x0, 0x10}, 0x10) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) fchdir(r4) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x5ab}, 0x28) 02:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1c4}}, 0x4000000) r1 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r2 = getpgrp(0x0) process_vm_writev(r2, &(0x7f00000026c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/50, 0x32}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/249, 0xf9}, {&(0x7f00000024c0)=""/235, 0xeb}, {0x0}, {&(0x7f00000025c0)=""/59, 0x3b}, {&(0x7f0000002600)=""/177, 0xb1}], 0x8, &(0x7f0000002b40)=[{&(0x7f0000002740)=""/206, 0xce}, {&(0x7f0000002840)=""/232, 0xe8}, {&(0x7f0000002940)=""/127, 0x7f}, {&(0x7f00000029c0)=""/159, 0x9f}, {&(0x7f0000002a80)=""/139, 0x8b}], 0x5, 0x0) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10) 02:16:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x200000000040a) sysinfo(&(0x7f00000007c0)=""/154) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000580)={0x1, 0x0, 0x0, &(0x7f0000000800)}) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, 0xffffffffffffffff) syz_open_dev$dri(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsync(0xffffffffffffffff) 02:16:41 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0xd567, 0x5, 0x3, 0x0, 0xfffffffffffffffa, 0x1, 0xe, 0xbc, 0x401, 0x9, 0x3, 0x78e, 0x6, 0x1fc0000000, 0x1, 0x57d5, 0xa69, 0x800, 0x3, 0x2, 0x9, 0x6, 0xa7, 0xfffffffffffffffb, 0x7, 0x7ff, 0x8000, 0x69d, 0x0, 0x7, 0xffffffff, 0xfff, 0x55, 0x284, 0x6, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x3, 0x80000000, 0x7, 0x5d13, 0xc0cf62a, 0xfffffffffffffffc}, 0x0, 0x0, r3, 0x2) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x5ab}, 0x28) 02:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000000, 0x20, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d17", 0x0, 0x100}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000600)='./file0\x00', 0x0, 0x8}, 0xffffffffffffffc1) 02:16:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:41 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x8}, [@netrom, @bcast, @netrom, @remote, @bcast, @default, @default, @netrom]}, 0x48) 02:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1381.682614] ax25_connect(): syz-executor2 uses autobind, please contact jreuter@yaina.de 02:16:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:43 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:43 executing program 2: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:43 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) fcntl$setsig(r0, 0xa, 0x2d) r1 = inotify_init1(0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040), 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) [ 1383.677515] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:16:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:44 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101300, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r1, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:46 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000000c0)={r2, &(0x7f0000000080)=""/14}) 02:16:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:46 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x42040, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000100)=r4, 0x4) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:46 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x301842, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={@remote={[], 0x1}, 0x2, 'tunl0\x00'}) fcntl$setstatus(r0, 0x4, 0x3fff) fcntl$setown(r0, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) getsockopt$inet_buf(r2, 0x0, 0x3f, &(0x7f0000000100)=""/23, &(0x7f0000000480)=0x17) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x7, 0x1b5, 0x0, 0x7fffffff, 0x0, 0x4000000, 0x80000, 0x8, 0x3, 0x5, 0x5, 0x58a1e63, 0x400, 0x7fff, 0x2, 0x6, 0x9, 0xed, 0x6, 0x1, 0x5, 0x400, 0x8, 0x0, 0x2, 0x3, 0x6, 0x8, 0x9, 0x3ff, 0x9, 0x0, 0x4, 0xd8, 0x9, 0x89, 0x0, 0x33b5, 0x2, @perf_config_ext={0x0, 0x8001}, 0x102, 0x5, 0x1, 0x5, 0x8, 0x2, 0x2}, 0x0, 0x9, r2, 0x1) r3 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000280)={0x1ff, 0x6}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x5b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000040)}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f0000000180)={0x80000000, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}}, 0x88) sendto(r5, &(0x7f0000000580)="1f158aa56f41bc23b9f2f33592b050ba47b4302aa8b78f2eb8a6e21cf963e6b4952e393b500900d487080993d8e4210ce46c2129e9c16e2256213d2f7b7d920c9703957831323cb1e724dc18714ee8f096c6dd5a43285b57fd29b0f739e644cf06da8526ce87c20e99b93929d0c65afd2c7db3ba71ed71d2051e3856770ab4e8e3c75b259eb418febe5f19e6ae50d915", 0x90, 0x80, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e20, @rand_addr=0x4}, 0x3, 0x0, 0x2, 0x1}}, 0x80) 02:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:48 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x80000000}, 0x28, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req={0x4, 0x2, 0x9, 0x5}, 0x10) 02:16:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:48 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x2) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7ff, 0x200000) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) [ 1388.253394] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:16:48 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x99, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000140)) accept4$netrom(r2, &(0x7f0000000080)={{0x3, @rose}, [@bcast, @netrom, @rose, @null, @rose, @null, @bcast]}, &(0x7f0000000100)=0x48, 0x80800) fcntl$setstatus(r0, 0x4, 0x3fff) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000180)={0x20000, 0x0, [0x40, 0xda, 0x0, 0x7, 0x9, 0x8001, 0x1, 0x100000001]}) r3 = gettid() fcntl$setown(r0, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:48 executing program 5: socket$packet(0x11, 0x3, 0x300) 02:16:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) 02:16:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 02:16:48 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) signalfd4(r1, &(0x7f0000000100)={0xd9}, 0x8, 0x80800) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @default, @bcast, @null, @netrom, @rose, @null, @bcast]}, &(0x7f00000000c0)=0x48) accept$packet(r1, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r2, 0x1, 0x6, @dev={[], 0x16}}, 0x10) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:48 executing program 1: mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fff) r1 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r1) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r0, 0xa, 0x21) inotify_add_watch(r0, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0x0) 02:16:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:49 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x6) mkdir(&(0x7f0000000240)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000040)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000001c0)={0x18}, 0x18) 02:16:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:49 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = fcntl$dupfd(r0, 0x533c22d0dde95fe7, r0) connect$rds(r1, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10) r2 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r3 = gettid() getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000280)={r4, @in={{0x2, 0x4e24, @remote}}}, &(0x7f0000000200)=0x84) fcntl$setown(r0, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2200, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x2203, &(0x7f0000000080)) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:51 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) dup(r0) 02:16:51 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:51 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mkdir(&(0x7f0000000240)='./control\x00', 0x3) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4000, 0xc) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000180)) r2 = inotify_init1(0x80000) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./control\x00', 0xa, 0x1) fcntl$setstatus(r0, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r0, 0x8, r3) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x4, 0x0, [], [{0xffffffffffff0000, 0x1, 0x0, 0x8, 0xfffffffffffffffb, 0xfffffffffffffff9}, {0x5, 0x4832, 0x3, 0x5, 0x6, 0xf9}], [[], [], [], []]}) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:51 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:16:51 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000280)=""/192, 0xc0}, {&(0x7f0000000340)=""/219, 0xdb}], 0x2, 0x0) fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./control\x00', r3}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000180)={{0xffffffffffffffe0, 0x7ff}, {0x5, 0x1000}, 0xc8d, 0x1, 0x2}) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000440)={0x101, 0x8, 0x5, 0x1000, 0x18, 0x8000, 0x0, 0x6, 0x1, 0x6}) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00000000c0)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:53 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x9, 0x475e, 0x1, 0x3, 0x1fffffffe00000, 0x0, 0xa7}, 0x1c) 02:16:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 02:16:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:16:53 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x301742, 0x189) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x481, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = signalfd(r0, &(0x7f00000000c0)={0x80000000}, 0x8) r3 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x101000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x2, 0x1, 0x3ff, 0x7, 0x8000}, &(0x7f0000000340)=0x14) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000380)={r4, 0x5, 0x2}, 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r5 = inotify_init1(0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000080)) fcntl$setstatus(r2, 0x4, 0x3fff) r7 = gettid() fcntl$setown(r2, 0x8, r7) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r5, 0xa, 0x21) inotify_add_watch(r5, &(0x7f00007a7000)='./control\x00', 0xa4000960) setsockopt$inet_MCAST_JOIN_GROUP(r6, 0x0, 0x2a, &(0x7f0000000140)={0x7, {{0x2, 0x4e21, @broadcast}}}, 0x88) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) 02:16:53 executing program 5: shmget(0x1, 0x4000, 0xa, &(0x7f0000ffb000/0x4000)=nil) r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x6, @mcast2, 0x100000001}}, 0x7, 0x7f0000000000, 0x7, 0x5, 0x48}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x9}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000300)=0x3b, 0x4) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x7, 0x62, 0x22, 0x6, 0x0, 0x4, 0x400, 0x2, 0x1f, 0x6, 0x3, 0x7fff, 0x3902, 0x3, 0x2, 0x5, 0x1, 0xaa, 0x1f, 0x8, 0xffff, 0x2a, 0x0, 0xfc, 0xe4d, 0x400, 0x1, 0x8, 0x0, 0x5, 0x5, 0x3, 0x0, 0x4, 0xff, 0x3, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000001c0), 0xb}, 0x20110, 0x0, 0x20, 0x2, 0x81, 0x100, 0x9f3b}, r3, 0x4, r1, 0xa) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r1, r1}) 02:16:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:53 executing program 0: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 3: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) 02:16:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:53 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) kcmp(r2, r3, 0x7, r1, r0) r4 = gettid() fcntl$setown(r0, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:54 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:54 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2800) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:16:55 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x2) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000001c0)=""/4096, &(0x7f0000000140)=0x1000) r1 = socket$packet(0x11, 0x10000000003, 0x300) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000000c0)={@local, 0x10, r3}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:16:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:55 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:55 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:55 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x21}, 0x10000, 0x0, 0x0, 0x8, 0x9, 0x9a56}, &(0x7f0000000100)=0x20) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000180)) r2 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r0, 0x8, r3) rt_sigprocmask(0x0, &(0x7f0000000080)={0xbffffffffffffffb}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f00000001c0)='./control/file0\x00', 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000140)={0x7f, 0x0, 0x7, 0x2}) 02:16:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:16:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:56 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:16:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:56 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1396.053223] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:16:58 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40000, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000140)={0x3, 0x7, 0xfffffffffffffe00}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) 02:16:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:58 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:58 executing program 1: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) mknod$loop(&(0x7f0000000040)='./control\x00', 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*-vboxnet0GPL\x00', 0xe, 0x0) timerfd_create(0x7, 0x1000000000080800) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x2, 0x0, 0x0, 0x400}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f00000001c0)="d1ccbb39ad6c8d176b6ebec1668d01c7ab175f3287d5b60a4c3b7601b67a84850021bbf6479b0a8e4e8745616f10e8b4418fd6a49b013d7b93c74912f1dae0cb0e8be2a46490cc1372893931", 0x4c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x58, 0x80) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000140)) 02:16:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:16:58 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:16:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1398.028645] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:16:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid', 0x3d, r2}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:16:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:16:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000000), 0xffffff33) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) msgget$private(0x0, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) 02:16:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1398.330986] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:00 executing program 5: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000001c0)=""/219) 02:17:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid', 0x3d, r2}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) clock_adjtime(0x0, &(0x7f0000000040)) mq_unlink(&(0x7f0000000000)='em0\x00') [ 1400.304492] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) clock_adjtime(0x0, &(0x7f0000000040)) mq_unlink(&(0x7f0000000000)='em0\x00') 02:17:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:00 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0xcb, "41a186a36658b83719bf302d80bfa8892b25e6f6d202bd276c9c439c5d9fb71de7c895ec113bbfb2c63191d16cabdf6728ccbd77c946e56eddd891644b0f445c22882f3d34c037ba1f1f40b938c1950894fac298f6d2db8e2a0c7e0212c9b170443643163c2eb292fb37b0769f6ec89308d6a0e8f7a7f6d4ab98ac885cfda32ec0f106da865b6dfeef150e201e5ef4ad3982c73065e8d2d1ad833fb2e1c176ee1ed9db5b5acf049c24d05e88e15ca19a5b68337afab0efdc1d1eedf4fb1afddc4671c3de229ef233ce4e53"}, &(0x7f0000000140)=0xef) r1 = socket$packet(0x11, 0x10000000003, 0x300) recvmmsg(r1, &(0x7f0000005680)=[{{&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000001280)=""/31, 0x1f}, 0x4}, {{&(0x7f00000012c0)=@x25, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001340)=""/88, 0x58}], 0x1, &(0x7f0000001400)=""/66, 0x42}, 0x200}, {{&(0x7f0000001480), 0x80, &(0x7f00000027c0)=[{&(0x7f0000001500)=""/52, 0x34}, {&(0x7f0000001540)=""/215, 0xd7}, {&(0x7f0000001640)=""/90, 0x5a}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/43, 0x2b}, {&(0x7f0000002700)=""/154, 0x9a}], 0x6, &(0x7f0000002840)=""/97, 0x61}, 0x6}, {{&(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002940)=""/217, 0xd9}, {&(0x7f0000002a40)=""/108, 0x6c}], 0x2, &(0x7f0000002b00)=""/78, 0x4e}, 0xfffffffffffffffc}, {{&(0x7f0000002b80)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/103, 0x67}, {&(0x7f0000003c80)=""/114, 0x72}, {&(0x7f0000003d00)=""/29, 0x1d}, {&(0x7f0000003d40)=""/80, 0x50}, {&(0x7f0000003dc0)=""/106, 0x6a}, {&(0x7f0000003e40)=""/48, 0x30}, {&(0x7f0000003e80)=""/36, 0x24}], 0x8}, 0x5}, {{&(0x7f0000003f40)=@alg, 0x80, &(0x7f0000004180)=[{&(0x7f0000003fc0)=""/12, 0xc}, {&(0x7f0000004000)=""/169, 0xa9}, {&(0x7f00000040c0)=""/157, 0x9d}], 0x3}, 0x5b0}, {{&(0x7f00000041c0)=@nfc_llcp, 0x80, &(0x7f0000005400)=[{&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f0000005240)=""/219, 0xdb}, {&(0x7f0000005340)=""/170, 0xaa}], 0x3, &(0x7f0000005440)=""/251, 0xfb}, 0xffffffffffffff01}, {{0x0, 0x0, &(0x7f0000005580)=[{&(0x7f0000005540)=""/58, 0x3a}], 0x1, &(0x7f00000055c0)=""/158, 0x9e}, 0x2}], 0x8, 0x20, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:17:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x200000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid', 0x3d, r2}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) clock_adjtime(0x0, &(0x7f0000000040)) mq_unlink(&(0x7f0000000000)='em0\x00') 02:17:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1400.631152] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) clock_adjtime(0x0, &(0x7f0000000040)) 02:17:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid', 0x3d, r2}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1400.917610] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:17:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:03 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1402.830567] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1403.168856] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:05 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:05 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 02:17:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:05 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:05 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1405.128490] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:05 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:05 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, 0x0, 0x0) 02:17:05 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1405.445098] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:07 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x40, 0x3, 0x1, "4e2cb95845966f2c5d4d50b9bd75f92c34cf3fbbaf2ce3d2669c1b358ee6a9b4", 0x38414262}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:17:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:17:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) [ 1407.208062] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 1407.533168] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:08 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:17:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:08 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) [ 1408.676074] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:09 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:09 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1408.976864] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:11 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10001, 0x236000) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x20) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 02:17:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, 0x0, 0x0) 02:17:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, 0x0, 0x0) 02:17:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) [ 1410.974692] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:17:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1411.276999] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x22d) 02:17:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:13 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1413.279096] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) [ 1413.581590] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1413.595329] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:14 executing program 5: r0 = socket$packet(0x11, 0xfffffffffd, 0x300) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000ac0)=0xe8) sendmmsg(r0, &(0x7f0000003e00)=[{{&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x8, "02f0e747a8731d4c52321d7e430c3777dc65990e5cd317c9a774a701ac915f79816229f5512850057bdb9de15bd5994586d6ae34e4c8922f59234816dae5b6", 0x3d}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000080)="ccb68db6256ceced6b3af693c4f59b70ae66b197494ffc1bde68f622078719e6d9c072badd38ffbd56e4d99ccc407a0fa7f775f4aef0def5d1b6d5035ddd4262c758266f5d164c4fb806e2021eda69d43ef7fde936470a1faacab70ed5d0a9e4d71aa148e27080e24bf4aec515ffe3c6e2f0f105efdfb9a3e625d6f2299885e4f0427d4813d6b734726d7e7a6dc0806fe8689d906ad1975d0341d6", 0x9b}, {&(0x7f00000001c0)="12eb8bd39586c6e29dff267e335c8dea43098d894ffc15c6312f248acf7e1e7f233784d103416fd0f228bc984d6d89d84a3c8f3dcf3f22382a19ffa6ae44736317d32dff4742018bd7ceb2e2b3c7217c394a1b599087b96bac22f1e3c2ca7146c071da77e350b2eda91d4cece13dda11dcd6bd77df65644d9542080a6f216224f141c00185ae5380fc03d2b985733dd72142102205592f4060d8cc12c22e599d1ca4f0495fbaba93385e9b196ca56b36da0adfb9a99d12581a413dd945d07f88c57fa52bd6e17f20edbcf06a3abebdc38da52fc61fde9478025768e8167fb287a1d196c7d6822dd355cbe5415c7d9d9f", 0xf0}, {&(0x7f0000000140)="9a0cb76c32e44770dd8f4ba60375e39780106171e7f927ce99e308a4e3905f101c280929e42966afd9b0bb5d01e95f331c04fcdab9695c8e1fd0bdc6583a3a", 0x3f}, {&(0x7f00000002c0)="d33f07c13582024304227cb06613e2593938157f501977d5ee1e467eb45406551b99182f8863dfcc4c71402d28adb1b8d26864f24cd32c64aaa65667ea01bfe91e68b5de9164f560fe892d43f954018416dc41b32f5165dd86", 0x59}, {&(0x7f0000000340)="98436c92e427d4e225f824e2d578b9b3be246cf79f9fb5170f0cb0db555eb2c064baca2e16d435acc1650a47a28d1bd1a7c06d6fce0aff46867b336c0ac51af973e656c320307c3bcb24e68d4245d7a96765a281fd169436593b4184e3c02d9749c90bbc85730bc92781bb44ba5adf010752660a69cdb9819c4e53dfae260fd8b3db946a46a87c06a4f285a7b9d94ec76879b1650b7aa9c7", 0x98}, {&(0x7f0000000400)="9fc5ba40c8cc502421f4db935d50816511f9564b3c2a7c66ba6da9f63c34a2017db0c4a2eb99cfb072c40bcf728292ef4edfde30310a87e98d1bfd37175606963b5a37b449bbb1fcadcd98999416d7a2aa832aca8eebbb040058ef5bde9a", 0x5e}], 0x6, &(0x7f0000000500)=[{0xb8, 0x0, 0x4, "4e075ab2d500a950ea02ddc6978aaf9370fea39508aceb0451b203cf18b5f4b10a4cd708f3cf7a4d9c1f249bdc9e1ae1037e52f8ae474721b369f18e1fa0d2d41c9f414e91ea55cf2fb65cb9746b0416a12d7f0d85aa5aca19671aba896afcb03d776c036bfe6fdd80dcd2889228c67618ab6a6541ee60b0f035eae1c0fb041cc2e8fabe7694235e36eb8f7ddfb276ea669538f60f2c43657c67f3f62f988ff9847c012f5d71"}, {0xd8, 0x0, 0x80000000, "315f4291dee3af9896457cc5891d279f8e3eac11324d23b33a868319df11e3ab05f7401b76f8f3c26f904226aff3b600279dc730b652995c20147cd7b5f9888702f52336a76071db6404775d15d83f60b090609d6db68666873a7db5915d79bcce577329abeec89769b632cceca648aca0870674d4f85c447fdab180d0885c15fd98ab34577921a30309255ac5bd8397e10fb7ee0f46d14ef6634690a3b6ae15cfce93b36f7140d9c84f9f2507502cea83537831677fd384cd253e2681099b66548678b34654ce90"}, {0x100, 0x11b, 0x7ff, "cbc1dcab4e2fca0e1c086f75f2e39ee9792f5f75d4a2d3a766a2605ddd9d6e893c26ce5899b095a68ebad63d70e1549e7fe4a5db6a4fac1a5a9159e1fdd6983e8f9a9d97e2cff3ebe0202a8d00f0e073338cee62188425ba60b1aaeac6c22fd14189d70af48cbb6d5fc79cf825cf7c0cda24ec64a1f8a9d41ce452778947a0b6bd188f81dd178282369de433611a1d7a295220092d275569492e50e963788accf9c9733d1b5908a480c4f68d9db02f30118d3b8bae2e9e20f6aa13704edfdba4eb32efc5295a1eadde757c3a6952f91ca4b8c99b6ad14a05b67082a4935dbf5c42b78ee729d49bc02a8d185b241d"}, {0x70, 0x117, 0x2, "79482e93f0edb4dc1d2c6da34219febd1b17b7aa4458bd50fc4b2103e6ae5e57006047b2cea0d5e9d4e1d8b874d4e6b0e607376888f056e057c39561d31dfabe413ce0bfd57b526d380431c6c5c5c4f69bcf5e878873797b5d93e6ecb5"}, {0x80, 0x195, 0x7, "8c4f98a7b9170a27ac38348006a284853fea61f6fa690321c968ec83808b484771067b27e4556cf7394c0294550bfb3e22107549f565ae3dd1b5b0d53ae83f0b016f416f6c5f5c6b4c3c890c9aed0f1009cb1e8b2744ef4a8b51260a1241a7b62523ebcd4a17ae50b608f0aa4cdb02"}, {0xb8, 0x0, 0x100000000, "de357f2dc84a06d40de4ab4f812557c6f8e95bd4d01d4761b2948d301d7aaf505f391d0e7c77481180e892d1c24f37f3f7d937e3eaf13a2429b6ac2b5d88f93bbb03e09f02d019b57cf10a6fd2878c96ef740edb3104a3f8275ee24d870bec56169506d9cd30c728a473718890ae4f16bce0bffa43cb728a32946624604c53495024ca8c5df409be4250d183c00dc847be38de6fe835d52eb0f58556869464d2078d19b7"}], 0x438}, 0x1}, {{&(0x7f0000000b00)=@can={0x1d, r1}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000001b80)="e7ebe4585928296ac55485a3e900156ab9d0aba26ed56756d900bf64ed1e8dd39a6dce5eb61532a48395f962b842bd0e1b21f502d987e9738ae1e96ab8244e1a435ef31f4545e909e64f14bd16f8caf61a20adce32ebdceba947260ddcb99add7963812d9cac00f80ad1a7b5928a3e5a9c1864c765ebd8c73216cdd3b570d7396539", 0x82}, {&(0x7f0000001c40)="b3c9a563bb8a90108a1885fbc32637e4e557e83d184497a22afe3915a6e7341ee40bb671c477a8a9", 0x28}, {&(0x7f0000001c80)="04a77d7d04430d4c00b5ba0f51603d6afa822fdefb1c9e", 0x17}], 0x4}, 0x7fffffff}, {{&(0x7f0000001d00)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001d80)="4984f83221665588f6d8836b53747e27ec94eb91779bcf72c87d62441d0e49261aae8e7724a04b15fb28b2553170bf19de5352ec527fb721adce32dcd72a0683a85d1da2b2b9baed38a63de5632ff7c768878c2f9a15423605bd7592f3b6c74ac68e00aebaa67a5f1159dc2a51b6e21e15d2ca2ef6b4373bc109965ea248a50325a47973bdd6c71780cda7abf64d3d48acb4db", 0x93}, {&(0x7f0000001e40)="e47173354abc3ab9c86b293c186af737839069fa830f4eb774d14e987128954ddbf298dfff928a114ef6f5c5ce460f14944f6062b3c2989adfe24b9c585170c47837a5d035400adcef1aa9a645c036b8c4bc500270a0cf234de322dd1851ea7026268e6d09269af470dcfb568cb97a6f5e", 0x71}, {&(0x7f0000001ec0)="d63fef19ca55598a5f4217850265757cb13ca446f9837197917c8405c0cd07c9567d77e4f6aea7b98f42f182453edb953da6df5c56c4c8b067afebd22d917eb78e20f6da90667d968bd435d1a66723d58574b81b3c405635be7af2c5fb974f71eaa2e244301bfdc74c658a73fa97c4b63fdf6ac37bde6d0ffa4e1f789b221f1963be870c", 0x84}, {&(0x7f0000001f80)="c98e7989288f97c2223c7c134c273e0811a1f91a1c0c513fd2ec5fefdf3d5e658bf45a280553a5856cd30bf8c24156bab8519577af913ae5b724457b94f89d0ab3dbc711052eb5fd2f949f9e83432608587912eb4d3ddcb8d26ce14102e7c0c15e39d0fe9155dc2118685c78975663b0f692882824d66079ee95bcef40572b668c6617d2ff6a21a1", 0x88}, {&(0x7f0000002040)="96d856e29af02c8a41519ba94caa9b95475bb7bdfa1a40eaaf9c0a674a84ce9a8ac4e4ac68b70bef7f5b7dc76dba915a4474d7b69445a3b496b91b6bc078e30067896dd9ea76c8ac3b8b599d40a641d9e9364228d441c63615c237c414b1b508b12c6a4bca8c3f7005d689f5c0770c71502adc5a31bffb4dced69949f152f63ae98e8fb656a66c41334315c83dff079fab0a1490c695413c0f5c52120fb565df16b72903ec653aaf01a26565ff629725c1dae0572885e64749aeeb", 0xbb}, {&(0x7f0000002100)="16c68d20971d428326999dd81cae83a4da8aecdcccf0dae4e4c283cfbeb111028fa79b0a6e10fcdac930088221bed7a427b613ed68a4fc221e27d604166e3f788120ce3d374df134d2752b674fcb845562015575bba17ff2429d4fb988407a82eaa5723675606440da77a374585a6aba249dbed8a706898008f660a6", 0x7c}, {&(0x7f0000002180)="76e02c4eb550d30c20fe1d23f43483ef96b7d21931dfc7644ab8e0323df0ce1af1e2e61fe2bab3c066be4b3bd68f3f8d6b2f2dec", 0x34}], 0x7, &(0x7f0000002240)=[{0xa0, 0x113, 0x1, "fe1eebcda6eea40a996fe620fb6818008073ec1579f40d4ce17aa112daab389ec374c0bae84b6ac5840f34010af4a283f957472446d327cb38cac423fc3a2a1c3e4101e83db84d6623d406bfe5d10a6ca73b9ed39c1920e7d0fdb0c12c70ded0c020edd7131ad5027cdefede9021fe83fe627e86d868d49bf135f2365c27a72babb020795543235d4db795"}, {0x10, 0x109, 0xd8ad}], 0xb0}, 0x7}, {{&(0x7f0000002300)=@nfc={0x27, 0x0, 0x0, 0x6}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002380)="a859f737bf9e11d908f8517972d2179c34143b57fd1c09311a3606fbfaca33cf6ca6e0b65f7337d11c8e16d5", 0x2c}, {&(0x7f00000023c0)="4eab701479b790d4f931cde73d78b5872a41d7a0b5ce01516de7463ed9c35c06baf2d05443c910494e8b7112811f1c58625fa55d83e9ae4d059f3b672890e380da758353df83158eb52d6b77ebdfdf9d5df7", 0x52}, {&(0x7f0000002440)="ac8cba25f639cf0953390208738f919db30aa9d09bacf2faa228b0922cc498ea", 0x20}], 0x3, &(0x7f00000024c0)=[{0x68, 0x101, 0x21ef3393, "1131f4d6f5aeded85fccf8eba4e06a43b8ed5b31a230b3e8de7835b0dc5439d6a036949cc12709c2d072fb59ac6ca844950144c2bb82793d2b4c1c4ce41dc5276699bc9708a0f0d5a4e1de528a77a8debb88fe"}, {0x108, 0x13b, 0x7, "1188cf1a5b2ab6281e9a892b899db938791b44df3631a445737bea010ca4f4d2eb32e863386c599a2b865ba8c36611946cfa2e24b3b90e61bf635bf960b63704f5a878f4e240a0a894e7fac49299d7dec4d106a9f40d7c47f8ff48a718af7869a4e8cb71fad4be57bf47b69a0b544ab7293cf5c0f31d3a91dcc2c6bc40b1b0d1866ad7f6fc85785d748367eeb04ea196f7813b9d1baf117df9c0137e391b69a2837c48919e45712f42d04ff79e21709f5241f5240b9f0f937252981ab5445669657a77b9f84fd3262a0a3002bf08d7a88d049bc332cfc6dd664bc4b8b0b3a713907c4b54e715cd282ab4dbfee8366ccbeec3d727"}], 0x170}, 0x6}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000002640)="278cf387dd99181fa8c1a5a62115d99feb05e5477a057683d2e1d3cfba0280cdc0168631b11b48752ecbaa32789fc8e7e6f59ee71663bc56b854b31f88e042602a0b8d702819b049fa2248248f045358eef7a2078281ec33ba137bab842fd9cef1d5facd0221dffa0877112bceb54ef966d8dddcbae8ff11aae2b01295610a20ce0248fe35268edb5ab24763ec0793e0667ed2d7d8be3c3a5e3bb97a3d5abf05916aa740d0c60e2d31309951237323969e5350d182e8cc056e0212c3aac57af100f4b5e0f7228f828aef730fb09017c66402f520a06ef2c858275f2c13a49150a68ab337d5367024ca680516def07d489eb475011e28ad16d7", 0xf9}], 0x1, &(0x7f0000002780)=[{0x1010, 0x116, 0x0, "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"}, {0xd8, 0x3a, 0x10001, "5f053de84901b17e31c02f3f7a5f1c96ff3aa4b0c40f84b4618c32ca50f724496f89a358cf38e7b9993eeffb49e4cd10e15347f456f156067c1e7f4b488758167293cd69d5202e6578eeaa95a70533f301542be9ece687aa99b447598fc71d30999d35a23872aa2a15266a4306e8021def0db0a3745ba3ba8420f5fe7360f410d9ea68fb82d66099a6794b1fe793a272b40d62f837848d741ad4afe242ea74e563d66a21d25f6a76221739af869af5dd94ca094b7551e7981e5881061df344a604c68a1204ff6e"}, {0x88, 0x107, 0xfffffffffffffff9, "715e86ceaec6a7fb6067c6f389c47179011a93ccf529fd058cab1aae71422eb8235809bd7679df153df18123281076bd6ebc81f067a6f36a9a73fcd17909dc09a5a6ad8883f5ad3fa33291df876892d7ee1a3cf48e6bc28abff7865083624d2b3a8cacad86e1e1f4bbdfdc5c887bdf5ccd6dfb6b1cc217c9"}, {0x48, 0x10e, 0x7, "f1e7dc938731760b744e962cd754e64c8fa61f72d42c424a3a972bb23eebac71d2268a0f7ec98dfcdf836747fd6aa299de"}], 0x11b8}, 0x9}, {{&(0x7f0000003940)=@sco={0x1f, {0x67, 0x800, 0x100000000, 0x9, 0xffffffff, 0x8}}, 0x80, &(0x7f0000003b40)=[{&(0x7f00000039c0)="3de4f26bd9ee273003bec32219a94d07d527046b", 0x14}, {&(0x7f0000003a00)="f52200a7168912e93dec599c9c8e1c70dd86680c9ea8d910", 0x18}, {&(0x7f0000003a40)="aa8a7adbb39c17327beeb9", 0xb}, {&(0x7f0000003a80)="30ed167b60e4f538c9cdb214852539e49030b52d1836039e0893fd2de9d947e121e5d6bf7437bf642a555aefafbd634f378f9e3e01408706678e739fa60e6a00dd039b37c36bf8639d855b03a0372dee64272fede6c6b4216e32cf7d3042ae784305e52f490ce274a5452a295f55fc025b00a3193be98e11b8f2a54beeaeb3c2d68f8bfc53b6a32735b975158b8f4ffbae7550c9a25f72c817087cf828683558de", 0xa1}], 0x4}, 0x5d1}, {{&(0x7f0000003b80)=@can, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003c00)="590a7eb285f62cec997b677de72913d49dd0ce50e06ec234238c5f8003adda1994a44c9952462a29072901ac6bf6e2d8a7df04ced27943f6a68aea06fa16d7c2981f657c0a8400b42c853b7b823ade6ea3c2fe6827b6ece15e30a459dd050757374ebf4f6b5ae107629b1f1a16795b3a00a3691d9bbd6014034add1eeee6e870e8c373a619ea2851aeeabceebdc8a9ee240db0072f02c8f539922fd2db79de1e2e03b894f669293176b1127a5ca7878039ab5d3f9336ac2351a059532535b2c2661fb0b2d6df3fb926fbd95ed80c01a651a2bede3b515b24372a7616459ac5a9c7f1e22266b1f5b1fb650e", 0xeb}, {&(0x7f0000003d00)="e801fc76294053bcd3e75954b0e315b4ab2be6f952b991688b359e1aed2c88218cf6d3369d06", 0x26}, {&(0x7f0000003d40)="a03b", 0x2}, {&(0x7f0000003d80)="d1cd75a27bbd42a27d23b8fdcc4e3e9d6cb01ead401fb3ca62df4209ad6f71ff170d90c1ddca771f0a35f2ad9fdb2ed37718060c201b3fe3ba4c88d41675", 0x3e}], 0x4}, 0x10000}], 0x7, 0x4080) r3 = fcntl$dupfd(r0, 0x1, r0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x1f, 0xffffffffffffff94) syz_mount_image$hfsplus(&(0x7f0000000940)='hfsplus\x00', &(0x7f0000000980)='./file0\x00', 0x3, 0x6, &(0x7f0000005340)=[{&(0x7f0000003fc0)="16341b0b478385ff0534512c82f7c7f987fb42bec872346800c04c1e617db6af1f8ad102c8905a7e13f9f15ec41c3eb69beaf60b8c5db4986faffc472633d90d2be83b740b0b71379dde14dd2c3a2f68e35f289667aa3fa7922ac546cac4facb459476f34936fc6d32e946bfec0df8523393fd55c456d6e8c22a4aae858c50189c0228271b99db74f2dcc65fd693b595f316ef8889c4a631bcc4afbed6a2", 0x9e, 0x7}, {&(0x7f0000004080)="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", 0x1000, 0x401}, {&(0x7f0000005080)="c268dba4d861ba5fccd87080fb34805ca699a4f8ae537d7856e5ecbbe936d47df1f5f246baf9152572ee34fa28b40442fb2f6871f3149cb26325499e3862bda9ea68338294b2a4a134784f49f09e99275089a78d6ae0cdf024b90d9c380a96c6c8fea578a7e1a7c13eaa13719f6048820cf0b5d8f6d0633b397e4456e5e40ee0e439f470b407cdd5862b9f125f902cfc472ffc811c7bbd03c63f9c46b2964c3ed1bfe8adb37c964df840f1217e7a27102cf2134f5c6204b43962e439", 0xbc, 0x3}, {&(0x7f0000005140)="91783397a367e988c52c580b0fe2ed6a703ff11137b7d93260f7b2879c57d9bb431228ff6893d8c01b493f6ec393aea85721f4224d3d86f27a7ef321623d", 0x3e, 0x800}, {&(0x7f0000005180)="d2362549ac7cfd91c6336e53622f3afe0df52e313f5e5819251b8c65851bf7fc338071eb48aa3f484715656961fc7981d2ad396c8ab2dfabff8eb3e3e54027ab0534a60213b04f3c6e5d38f7b1731ef2319ad9bf36aa815b3497e7fa37f26e90a1914dbc320d0d3daea309f23da08493cb408fcf853b25f5c0b0e88bdd7e62fcf9cc3d2f9b3490c24fdae6000b072288ecff5cf9c3d3ebffcae6fce8d2e41c677999ab2bfb1a", 0xa6}, {&(0x7f0000005240)="aada590fe9446512b46687e0e5e25699593de1a5343be67282806bb3afa3a376f7f81690be8757f5c8751df95ddc6f66d99a068c45808afc86201e6726ba2f01d77c6ae676e19ddfa421f29803f046467fdc4f3771e9c4dde8ed171003f3821f631a49f3c0469270dd21ff12c0a6ab490e89f37447c1e99053e7ed3e86fa43cd205a832bfc3407ff6bf0a792eff3e5f74cdaadccfb12cd2cf77cb7967cc39f9b74f05cbe7cc4a0bed6192ae146bef3577d4b8e732dce591bdd432653e3eb64738ed75a4b8bc721392302ff84699d1e17b08fb88df3f59312816b8e67b3c4843e41a3ac9a312efad8859cc444e48d8aa23f7f71", 0xf3, 0x3}], 0x800, &(0x7f0000005400)={[{@barrier='barrier'}], [{@uid_gt={'uid>', r2}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@smackfsroot={'smackfsroot', 0x3d, 'hash\x00'}}, {@euid_gt={'euid>', r2}}, {@dont_hash='dont_hash'}, {@uid_eq={'uid', 0x3d, r2}}, {@fsname={'fsname', 0x3d, 'user]&^'}}, {@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'trustedeth0'}}]}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f00000054c0)='/dev/ashmem\x00', 0x20080, 0x0) 02:17:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:14 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) 02:17:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 02:17:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:15 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') 02:17:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) [ 1414.720662] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1414.741656] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={0x0, 0x0, 0x10}, 0x10) 02:17:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7f, 0x80000) r3 = openat$cgroup_int(r2, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x100, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x200, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000000), 0xffffff33) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x0, 0x4, 0x20}, 0xb) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6}, 0x14) msgget$private(0x0, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) gettid() mount$9p_virtio(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r6, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmod(r1, 0x0) 02:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1414.927907] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1414.937877] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={0x0, 0x0, 0x10}, 0x10) 02:17:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:15 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002640)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000002740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002880)=0xe8) fstat(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./control\x00', 0xa81, 0x9, &(0x7f0000002540)=[{&(0x7f00000000c0)="2d530ba5e5febcbdeeaf5d6994452c8a11b9a1baea6cf33a33cdec9d40a2bfc11cf5933df7607f053fc02d6c73685adcbb8a9d4c6cabf3d37bc4f35986be6fc728913b5b9cfbc9f9355694cdd8e6dc7d7b13a03ca6c9fd55fdfaabf28b61303a57089da96150aa07ab0795929197bd3ae8eb2f85cb438f2c09131d2dc19b6bfd9ce85a77645e22c143c39ed62f56de5e65b2", 0x92, 0x8}, {&(0x7f0000000280)="3b5a9a321d80e9bfdc09fb750cebdefc3a6fbed7679965dc158aa3cdadf1516ef7a0ed4e16356fb47d8ad05111600522ea3b3c1a84a24a9a102d38b8e09f987754bd4f36f1d41c64b8926cfc1ebe446bdd0a646188016315d0ea954f81295a806dcf185b7e90755df55c5d977e74499301b2af87908f44aa2a79c80b83124b40b79c3a3c5423d6f3d62a214f000798d6e5d89cb427be3dcb8187bf83aa1514ad7d46686d22d46059d14b4b2aa66fb19600ee804c80e094b4f994c745abf9488ca85b34852953e27afd95f62ffc3395a9", 0xd0, 0x8}, {&(0x7f0000000180)="554ffe44f045ab7bdeed6e00dde0ad88639075a0f652776963ac35c8ff35eb855164b71cdffb6810cb061f15e0cafc52a969cb817abab8d78eb48cf57b5dc9e26940754c27c3597aaa71708126091d", 0x4f, 0x2}, {&(0x7f0000000380)="7dcaa88cda72c6c62e39959680f8cba5a911f52e36ab3ea873cef26ce6d411b479c20af8871c31a86ce6a92abb489e2cc4f0a157c0fe076b3e353672e73d3dc6f2f0c8e9169120ef9661855f545105b77d1fef3566fe4ad6f12752cd1a7579d06c6c6e4ea27f431e33b0d9908bc42c52c3ac85dc6c4f29aecad16e4cca2d3c60650168af3eecde2fa836f5afdb4cb430ef1a51897345078a120de7c09f79c50268e7f7e911ef79b1b4659b1bb77f632337676296b145db28ddf944e98df5a56f4bea3c0c5ae26937bd691201dde24be926f22e56", 0xd4, 0x9}, {&(0x7f0000000200)="8dbf5417a8f59e6760d4f7fcbc47776549a6724a7810b6", 0x17, 0x2}, {&(0x7f0000000480)="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", 0x1000, 0x5}, {&(0x7f0000001480)="d7ccad09295189c6c4de27ed5838ec1659a8f84b64c180371d15773a2d7c6315ab5cd4d96ad0937c76320211dbce6ff3df0990adcd4ead8f50034d251e0fa6ccd439", 0x42, 0x4}, {&(0x7f0000001500)="53d475eec69b37f8cde84f001acc549ecc80a6f3284a", 0x16, 0x5}, {&(0x7f0000001540)="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", 0x1000, 0x100000000}], 0x0, &(0x7f0000002940)={[{@grpquota='grpquota'}, {@umask={'umask', 0x3d, 0x8}}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[mime_type'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@uid_lt={'uid<', r5}}, {@seclabel='seclabel'}]}) fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 1415.334203] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1415.380318] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:17 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x3c7) 02:17:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={0x0, 0x0, 0x10}, 0x10) 02:17:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$FICLONE(r2, 0x40049409, r0) clock_adjtime(0x0, &(0x7f0000000040)) 02:17:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xfffffffffffffffd, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r2, &(0x7f0000000200), 0x0, 0x20008011, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000180)) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) pwritev(r4, &(0x7f0000000740), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$inet(0x2, 0x6000000000000003, 0x6) fstat(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x8001, 0x7}, {0x5, 0x2}], r8}, 0x18, 0x2) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r7, &(0x7f00000003c0)="8472e79f3703cb06a37a3e0f8012eee6ba1068cfa7aafbd26112d015eb443231f2974068360dbfacc377b455468ffc16c0ca85111c5008d477386c465c9ec4a43315a0060000007a3cdadeec827c72feca3515d6858ce3f2f316d7f35a0f3b", 0x5f, 0x404c0c0, 0x0, 0x0) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000380)={0x0, 0x0, 0x2ffd}, 0x4) sendto$inet(r2, &(0x7f0000000740)="3c9da881d31078f06f87f9eb29284698f780da8a289a60656bb5372567be156942252b80a1f71f5243a6ab14b9a9b82046e09ae049b4b4702272df0b4010473923a5a972c21ddf7d658e7798da42614fd46c43eab3638462075fbacaf49d67e55f7641f27646b3e6ab0e58c109aeff6a7a5a8351334ef27835843efde9c1ec0e44b3071737995cf9ccfc9c0dbde3a8c0bccff8e819b5425c98c35ac66ce854391473ea511db830043e0cde616c19d8d588b764d094932728353a2c90b08303200b00318e25eee655af2259760a61b1db7a20653001c326c1207422318bdda1ee1f14b4d80a7b966a535911989162139ed2547e91b39c8099eeb21808b63d806abeb89fe7c35f9eb41dfd2a127b4c5f4e9d4f00c5208f2a04f9b0a37f6fadde772849c361b1f21343", 0x321, 0x8000, 0x0, 0xffffffffffffffee) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)={0x0, {{0x2, 0x0, @broadcast}}}, 0x90) setgroups(0x4000032d, &(0x7f0000000640)) sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x8c, 0x0, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffff71a6}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x276cf55d9308d64c, 0x13}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xdd8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x11}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x801}, 0x40000) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000400200) clock_adjtime(0xb000000, 0x0) [ 1417.131578] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1417.140289] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={'trans=virtio,', {[{@access_any='access=any'}, {@access_uid={'access'}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid'}}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}], [{@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f000082a000/0x3000)=nil, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x2, 0x80000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000100)=0x8) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) clock_adjtime(0xb000000, 0x0) [ 1417.310175] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1417.380084] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:18 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioprio_get$pid(0x1, r1) 02:17:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 02:17:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:18 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000240)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() symlinkat(&(0x7f0000000040)='./control/file0\x00', r1, &(0x7f0000000080)='./control/file0\x00') fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x40000000000, 0x402002) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000100)={'ip6gre0\x00', 0xb758}) ioctl$sock_ifreq(r3, 0x891d, &(0x7f0000000280)={'dummy0\x00', @ifru_data=&(0x7f0000000200)="7de173d93690a13ffca989e9379b2ba901b8e8bc5ebcc538f2b27ea7b5f7ba3c"}) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r3, &(0x7f0000000140)="3391299a90b1ee7e8f0bc18742772f117aac7b816af7e3913c5cb77424a095a676700dabd9674564ab06af339ed4cbb6672ed8e12867d18cc06e15a52253bdcbd4e6acc844d995eef978d3c70de056b977edf73050d3879e00642000e38d07d57062baeabf1f75ba96", &(0x7f00000002c0)=""/4096}, 0x18) 02:17:18 executing program 0 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:18 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xdeed, 0x410200) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x1000, 0x5, 0x0, 0x7fff, 0x5, 0xfffffffffffffff7}) [ 1418.492008] FAULT_INJECTION: forcing a failure. [ 1418.492008] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.504785] CPU: 0 PID: 32512 Comm: syz-executor0 Not tainted 4.20.0+ #167 [ 1418.511812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1418.511819] Call Trace: [ 1418.511845] dump_stack+0x1d3/0x2c6 [ 1418.511869] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1418.511895] ? find_held_lock+0x36/0x1c0 [ 1418.511919] should_fail.cold.4+0xa/0x17 [ 1418.511939] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1418.511963] ? mark_held_locks+0x130/0x130 [ 1418.550477] ? find_held_lock+0x36/0x1c0 [ 1418.550517] ? graph_lock+0x270/0x270 [ 1418.550566] ? find_held_lock+0x36/0x1c0 [ 1418.550641] ? ___might_sleep+0x1ed/0x300 [ 1418.550675] ? arch_local_save_flags+0x40/0x40 [ 1418.562639] ? lock_downgrade+0x900/0x900 [ 1418.562662] ? proc_fail_nth_write+0x9e/0x210 [ 1418.562684] __should_failslab+0x124/0x180 [ 1418.562702] should_failslab+0x9/0x14 [ 1418.562719] kmem_cache_alloc+0x2be/0x730 [ 1418.562744] getname_flags+0xd0/0x590 [ 1418.596100] getname+0x19/0x20 [ 1418.599381] bpf_obj_get_user+0xd4/0x610 [ 1418.603471] ? usercopy_warn+0x110/0x110 [ 1418.607540] ? bpf_obj_pin_user+0x4d0/0x4d0 [ 1418.611895] bpf_obj_get+0xbe/0x100 [ 1418.615525] __x64_sys_bpf+0x396/0x520 [ 1418.619417] ? bpf_prog_get+0x20/0x20 [ 1418.623241] do_syscall_64+0x1b9/0x820 [ 1418.627153] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1418.632545] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1418.637479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1418.642327] ? trace_hardirqs_on_caller+0x310/0x310 [ 1418.647405] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1418.652427] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1418.657483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1418.662359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1418.667555] RIP: 0033:0x457759 [ 1418.670754] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1418.689673] RSP: 002b:00007fb5a5a05c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1418.697385] RAX: ffffffffffffffda RBX: 00007fb5a5a05c90 RCX: 0000000000457759 [ 1418.704653] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1418.711927] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1418.719200] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5a5a066d4 [ 1418.726469] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 02:17:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1418.763007] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1418.778609] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:19 executing program 0 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1418.888819] FAULT_INJECTION: forcing a failure. [ 1418.888819] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.948310] CPU: 0 PID: 32522 Comm: syz-executor0 Not tainted 4.20.0+ #167 [ 1418.955372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1418.964932] Call Trace: [ 1418.967564] dump_stack+0x1d3/0x2c6 [ 1418.971215] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1418.976442] ? __kernel_text_address+0xd/0x40 [ 1418.980972] ? unwind_get_return_address+0x61/0xa0 [ 1418.985937] should_fail.cold.4+0xa/0x17 [ 1418.990032] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1418.995150] ? save_stack+0xa9/0xd0 [ 1418.998792] ? kasan_kmalloc+0xc7/0xe0 [ 1419.002686] ? kasan_slab_alloc+0x12/0x20 [ 1419.006867] ? kmem_cache_alloc+0x12e/0x730 [ 1419.011201] ? getname_flags+0xd0/0x590 [ 1419.015188] ? getname+0x19/0x20 [ 1419.018567] ? bpf_obj_get_user+0xd4/0x610 [ 1419.022807] ? bpf_obj_get+0xbe/0x100 [ 1419.026633] ? do_syscall_64+0x1b9/0x820 [ 1419.030712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.036113] ? graph_lock+0x270/0x270 [ 1419.039935] ? find_held_lock+0x36/0x1c0 [ 1419.044034] ? ___might_sleep+0x1ed/0x300 [ 1419.048193] ? arch_local_save_flags+0x40/0x40 [ 1419.052789] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1419.058363] __should_failslab+0x124/0x180 [ 1419.062624] should_failslab+0x9/0x14 [ 1419.066445] kmem_cache_alloc+0x2be/0x730 [ 1419.070623] getname_kernel+0x54/0x370 [ 1419.074525] kern_path+0x1e/0x40 [ 1419.077902] bpf_obj_get_user+0x174/0x610 [ 1419.082056] ? usercopy_warn+0x110/0x110 [ 1419.086136] ? bpf_obj_pin_user+0x4d0/0x4d0 [ 1419.090478] bpf_obj_get+0xbe/0x100 [ 1419.094113] __x64_sys_bpf+0x396/0x520 [ 1419.098008] ? bpf_prog_get+0x20/0x20 [ 1419.101832] do_syscall_64+0x1b9/0x820 [ 1419.105725] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1419.111095] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1419.116032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1419.120882] ? trace_hardirqs_on_caller+0x310/0x310 [ 1419.125904] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1419.130946] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1419.135971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1419.140830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.146020] RIP: 0033:0x457759 [ 1419.149233] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1419.168134] RSP: 002b:00007fb5a5a05c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1419.175845] RAX: ffffffffffffffda RBX: 00007fb5a5a05c90 RCX: 0000000000457759 [ 1419.183112] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1419.190382] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1419.197649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5a5a066d4 [ 1419.204918] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 [ 1419.283645] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:17:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:19 executing program 0 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1419.358605] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffc2, &(0x7f0000000040)='/proc/self/attr/current\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1419.504594] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1419.647925] FAULT_INJECTION: forcing a failure. [ 1419.647925] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.715283] CPU: 1 PID: 32541 Comm: syz-executor0 Not tainted 4.20.0+ #167 [ 1419.722359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.731720] Call Trace: [ 1419.734324] dump_stack+0x1d3/0x2c6 [ 1419.737982] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1419.743192] ? __kernel_text_address+0xd/0x40 [ 1419.747705] ? unwind_get_return_address+0x61/0xa0 [ 1419.752652] should_fail.cold.4+0xa/0x17 [ 1419.756729] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1419.761878] ? save_stack+0xa9/0xd0 [ 1419.765513] ? kasan_kmalloc+0xc7/0xe0 [ 1419.769411] ? kasan_slab_alloc+0x12/0x20 [ 1419.773566] ? kmem_cache_alloc+0x12e/0x730 [ 1419.777909] ? getname_flags+0xd0/0x590 [ 1419.781907] ? getname+0x19/0x20 [ 1419.785284] ? bpf_obj_get_user+0xd4/0x610 [ 1419.789522] ? bpf_obj_get+0xbe/0x100 [ 1419.793332] ? do_syscall_64+0x1b9/0x820 [ 1419.797412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.802822] ? find_held_lock+0x36/0x1c0 [ 1419.806913] ? ___might_sleep+0x1ed/0x300 [ 1419.811088] ? arch_local_save_flags+0x40/0x40 [ 1419.815685] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1419.821264] __should_failslab+0x124/0x180 [ 1419.825513] should_failslab+0x9/0x14 [ 1419.829329] kmem_cache_alloc+0x2be/0x730 [ 1419.833504] getname_kernel+0x54/0x370 [ 1419.837410] kern_path+0x1e/0x40 [ 1419.840793] bpf_obj_get_user+0x174/0x610 [ 1419.844952] ? usercopy_warn+0x110/0x110 [ 1419.849027] ? bpf_obj_pin_user+0x4d0/0x4d0 [ 1419.853401] bpf_obj_get+0xbe/0x100 [ 1419.857041] __x64_sys_bpf+0x396/0x520 [ 1419.860968] ? bpf_prog_get+0x20/0x20 [ 1419.864795] do_syscall_64+0x1b9/0x820 [ 1419.868695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1419.874074] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1419.879018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1419.883872] ? trace_hardirqs_on_caller+0x310/0x310 [ 1419.888948] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1419.893989] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1419.899040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1419.903904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.909284] RIP: 0033:0x457759 [ 1419.912489] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1419.931398] RSP: 002b:00007fb5a5a05c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1419.939122] RAX: ffffffffffffffda RBX: 00007fb5a5a05c90 RCX: 0000000000457759 [ 1419.946439] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1419.953716] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:17:20 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1419.960995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5a5a066d4 [ 1419.968779] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 [ 1419.981818] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1420.138525] FAULT_INJECTION: forcing a failure. [ 1420.138525] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.159834] CPU: 1 PID: 32552 Comm: syz-executor3 Not tainted 4.20.0+ #167 [ 1420.166891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1420.166923] Call Trace: [ 1420.166949] dump_stack+0x1d3/0x2c6 [ 1420.166979] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1420.187767] ? mark_held_locks+0x130/0x130 [ 1420.187791] should_fail.cold.4+0xa/0x17 [ 1420.187809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1420.201278] ? ima_get_action+0x7e/0xa0 [ 1420.205271] ? print_usage_bug+0xc0/0xc0 [ 1420.209363] ? graph_lock+0x270/0x270 [ 1420.213180] ? print_usage_bug+0xc0/0xc0 [ 1420.217266] ? find_held_lock+0x36/0x1c0 [ 1420.221373] ? __lock_is_held+0xb5/0x140 [ 1420.225476] ? kvm_mmu_load+0xff8/0x1220 [ 1420.229566] ? ___might_sleep+0x1ed/0x300 [ 1420.233726] ? arch_local_save_flags+0x40/0x40 [ 1420.238334] __should_failslab+0x124/0x180 [ 1420.242594] should_failslab+0x9/0x14 [ 1420.246424] kmem_cache_alloc_trace+0x2d7/0x750 [ 1420.251149] tcp_sendmsg_locked+0x2754/0x3f90 [ 1420.255671] ? lock_downgrade+0x900/0x900 [ 1420.259834] ? check_preemption_disabled+0x48/0x280 [ 1420.264872] ? tcp_sendpage+0x60/0x60 [ 1420.268688] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1420.273281] ? retint_kernel+0x2d/0x2d [ 1420.277182] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1420.282144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1420.286912] ? trace_hardirqs_off+0x310/0x310 [ 1420.291439] ? find_held_lock+0x36/0x1c0 [ 1420.295543] ? mark_held_locks+0xc7/0x130 [ 1420.299730] ? __local_bh_enable_ip+0x160/0x260 [ 1420.304411] ? __local_bh_enable_ip+0x160/0x260 [ 1420.309131] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1420.313766] ? trace_hardirqs_on+0xbd/0x310 [ 1420.318146] ? lock_release+0xa00/0xa00 [ 1420.322138] ? lock_sock_nested+0xe2/0x120 [ 1420.326395] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1420.331863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1420.337414] ? check_preemption_disabled+0x48/0x280 [ 1420.342446] ? lock_sock_nested+0x9a/0x120 [ 1420.346703] ? lock_sock_nested+0x9a/0x120 [ 1420.350970] ? __local_bh_enable_ip+0x160/0x260 [ 1420.355673] tcp_sendmsg+0x2f/0x50 [ 1420.359252] inet_sendmsg+0x1a1/0x690 [ 1420.363069] ? ipip_gro_receive+0x100/0x100 [ 1420.367415] ? smack_socket_sendmsg+0xb0/0x190 [ 1420.372008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1420.377562] ? security_socket_sendmsg+0x94/0xc0 [ 1420.382330] ? ipip_gro_receive+0x100/0x100 [ 1420.386690] sock_sendmsg+0xd5/0x120 [ 1420.390419] __sys_sendto+0x3d7/0x670 [ 1420.394239] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1420.398926] ? wait_for_completion+0x8a0/0x8a0 [ 1420.403523] ? __lock_is_held+0xb5/0x140 [ 1420.407600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1420.413153] ? __sb_end_write+0xd9/0x110 [ 1420.417234] ? fput+0x130/0x1a0 [ 1420.420526] ? do_syscall_64+0x9a/0x820 [ 1420.424524] ? do_syscall_64+0x9a/0x820 [ 1420.428523] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1420.433136] ? trace_hardirqs_on+0xbd/0x310 [ 1420.437464] ? __ia32_sys_read+0xb0/0xb0 [ 1420.441545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1420.446947] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1420.452419] __x64_sys_sendto+0xe1/0x1a0 [ 1420.456508] do_syscall_64+0x1b9/0x820 [ 1420.460400] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1420.465769] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1420.470704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1420.475555] ? trace_hardirqs_on_caller+0x310/0x310 [ 1420.480582] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1420.485605] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1420.490628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1420.495479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1420.500669] RIP: 0033:0x457759 [ 1420.503864] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1420.522764] RSP: 002b:00007f5e0abd1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1420.530478] RAX: ffffffffffffffda RBX: 00007f5e0abd1c90 RCX: 0000000000457759 [ 1420.537746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1420.545048] RBP: 000000000073bf00 R08: 00000000208d4fe4 R09: 000000000000001c [ 1420.552320] R10: 0000000020000008 R11: 0000000000000246 R12: 00007f5e0abd26d4 [ 1420.559598] R13: 00000000004c4a7a R14: 00000000004d81c0 R15: 0000000000000006 02:17:21 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004000)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000004100)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000004140)={@loopback, 0x21, r2}) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x1}, 0x7) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x10) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) fanotify_mark(r1, 0x96, 0x8, r1, &(0x7f0000000100)='./file0\x00') 02:17:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:21 executing program 0 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:17:21 executing program 3 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1421.794048] FAULT_INJECTION: forcing a failure. [ 1421.794048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1421.805912] CPU: 1 PID: 32559 Comm: syz-executor0 Not tainted 4.20.0+ #167 [ 1421.812948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1421.812956] Call Trace: [ 1421.812994] dump_stack+0x1d3/0x2c6 [ 1421.813030] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1421.833860] should_fail.cold.4+0xa/0x17 [ 1421.837952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1421.843099] ? is_bpf_text_address+0xac/0x170 [ 1421.847643] ? lock_downgrade+0x900/0x900 [ 1421.851800] ? check_preemption_disabled+0x48/0x280 [ 1421.856830] ? mark_held_locks+0x130/0x130 [ 1421.861076] ? rcu_softirq_qs+0x20/0x20 [ 1421.865065] ? unwind_dump+0x190/0x190 [ 1421.868949] ? is_bpf_text_address+0xd3/0x170 [ 1421.873438] ? kernel_text_address+0x79/0xf0 [ 1421.877897] ? __kernel_text_address+0xd/0x40 [ 1421.882388] ? unwind_get_return_address+0x61/0xa0 [ 1421.887318] ? __save_stack_trace+0x8d/0xf0 [ 1421.891673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1421.897203] ? should_fail+0x22d/0xd01 [ 1421.901090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1421.906216] __alloc_pages_nodemask+0x366/0xea0 [ 1421.910878] ? kasan_slab_alloc+0x12/0x20 [ 1421.915033] ? kmem_cache_alloc+0x12e/0x730 [ 1421.919355] ? getname_flags+0xd0/0x590 [ 1421.923325] ? getname+0x19/0x20 [ 1421.926696] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 1421.931764] ? find_held_lock+0x36/0x1c0 [ 1421.935840] ? ___might_sleep+0x1ed/0x300 [ 1421.939985] ? trace_hardirqs_off+0xb8/0x310 [ 1421.944408] cache_grow_begin+0x91/0x8c0 [ 1421.948468] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1421.954004] ? check_preemption_disabled+0x48/0x280 [ 1421.959057] kmem_cache_alloc+0x665/0x730 [ 1421.963209] getname_kernel+0x54/0x370 [ 1421.967130] kern_path+0x1e/0x40 [ 1421.970535] bpf_obj_get_user+0x174/0x610 [ 1421.974685] ? usercopy_warn+0x110/0x110 [ 1421.978747] ? bpf_obj_pin_user+0x4d0/0x4d0 [ 1421.983114] bpf_obj_get+0xbe/0x100 [ 1421.986739] __x64_sys_bpf+0x396/0x520 [ 1421.990677] ? bpf_prog_get+0x20/0x20 [ 1421.994507] do_syscall_64+0x1b9/0x820 [ 1421.998403] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1422.003769] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1422.008692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1422.013536] ? trace_hardirqs_on_caller+0x310/0x310 [ 1422.018558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1422.023594] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1422.028621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1422.033478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.038662] RIP: 0033:0x457759 [ 1422.041868] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1422.060782] RSP: 002b:00007fb5a5a05c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1422.068489] RAX: ffffffffffffffda RBX: 00007fb5a5a05c90 RCX: 0000000000457759 [ 1422.075754] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1422.083023] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1422.090288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5a5a066d4 [ 1422.097554] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 [ 1422.113096] FAULT_INJECTION: forcing a failure. [ 1422.113096] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.124445] CPU: 0 PID: 32566 Comm: syz-executor3 Not tainted 4.20.0+ #167 [ 1422.131467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1422.140826] Call Trace: [ 1422.143427] dump_stack+0x1d3/0x2c6 [ 1422.147068] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1422.152289] should_fail.cold.4+0xa/0x17 [ 1422.156367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1422.161481] ? graph_lock+0x270/0x270 [ 1422.165291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.170838] ? check_preemption_disabled+0x48/0x280 [ 1422.175872] ? __lock_is_held+0xb5/0x140 [ 1422.179997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.185634] ? __rt6_find_exception_rcu+0x379/0x510 [ 1422.190660] ? check_preemption_disabled+0x48/0x280 [ 1422.195688] ? rt6_exception_hash+0x7e0/0x7e0 [ 1422.200196] ? __lock_is_held+0xb5/0x140 [ 1422.204268] __should_failslab+0x124/0x180 [ 1422.208512] should_failslab+0x9/0x14 [ 1422.212324] kmem_cache_alloc+0x47/0x730 [ 1422.216400] ? kasan_check_read+0x11/0x20 [ 1422.220559] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1422.225835] ? kasan_check_read+0x11/0x20 [ 1422.230067] dst_alloc+0xbb/0x1d0 [ 1422.233553] ip6_dst_alloc+0x35/0xa0 [ 1422.237295] ip6_pol_route+0x76d/0x11e0 [ 1422.241277] ? ip6_pol_route_lookup+0xe70/0xe70 [ 1422.245946] ? mark_held_locks+0xc7/0x130 [ 1422.250096] ? _raw_spin_unlock_irq+0x27/0x80 [ 1422.254617] ? _raw_spin_unlock_irq+0x27/0x80 [ 1422.259165] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1422.263742] ? trace_hardirqs_on+0xbd/0x310 [ 1422.268072] ? kasan_check_read+0x11/0x20 [ 1422.272216] ? finish_task_switch+0x1f4/0x910 [ 1422.276707] ? compat_start_thread+0x80/0x80 [ 1422.281111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.286649] ? print_usage_bug+0xc0/0xc0 [ 1422.290725] ? _raw_spin_unlock_irq+0x60/0x80 [ 1422.295233] ? finish_task_switch+0x1f4/0x910 [ 1422.299744] ? finish_task_switch+0x1b4/0x910 [ 1422.304232] ? __switch_to_asm+0x34/0x70 [ 1422.308292] ip6_pol_route_output+0x54/0x70 [ 1422.312631] ? ip6_pol_route_input+0x80/0x80 [ 1422.317094] fib6_rule_lookup+0x13a/0x860 [ 1422.321243] ? fib6_lookup+0x480/0x480 [ 1422.325141] ? __schedule+0x874/0x1ed0 [ 1422.329045] ? rcu_softirq_qs+0x20/0x20 [ 1422.333021] ? mark_held_locks+0x130/0x130 [ 1422.337268] ? mark_held_locks+0xc7/0x130 [ 1422.341413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.346954] ip6_route_output_flags+0x2c5/0x350 [ 1422.351674] ip6_dst_lookup_tail+0xe27/0x1d60 [ 1422.356169] ? trace_hardirqs_off+0x310/0x310 [ 1422.360673] ? retint_kernel+0x1b/0x2d [ 1422.364570] ? trace_hardirqs_on+0x310/0x310 [ 1422.368979] ? dst_output+0x180/0x180 [ 1422.372800] ? retint_kernel+0x2d/0x2d [ 1422.376714] ? graph_lock+0x270/0x270 [ 1422.380521] ? update_stack_state+0x469/0x690 [ 1422.385018] ? graph_lock+0x270/0x270 [ 1422.388832] ? find_held_lock+0x36/0x1c0 [ 1422.392935] ip6_dst_lookup_flow+0xc8/0x270 [ 1422.397270] ? ip6_dst_lookup+0x60/0x60 [ 1422.401247] tcp_v6_connect+0x11ce/0x29c0 [ 1422.405398] ? tcp_v6_pre_connect+0x130/0x130 [ 1422.409916] ? __kernel_text_address+0xd/0x40 [ 1422.414469] ? unwind_get_return_address+0x61/0xa0 [ 1422.419413] ? __save_stack_trace+0x8d/0xf0 [ 1422.423760] ? save_stack+0xa9/0xd0 [ 1422.427385] ? save_stack+0x43/0xd0 [ 1422.431002] ? kasan_kmalloc+0xc7/0xe0 [ 1422.434884] ? kmem_cache_alloc_trace+0x152/0x750 [ 1422.439735] ? tcp_sendmsg_locked+0x2754/0x3f90 [ 1422.444413] ? tcp_sendmsg+0x2f/0x50 [ 1422.448142] ? inet_sendmsg+0x1a1/0x690 [ 1422.452155] ? sock_sendmsg+0xd5/0x120 [ 1422.456123] ? __sys_sendto+0x3d7/0x670 [ 1422.460091] ? __x64_sys_sendto+0xe1/0x1a0 [ 1422.464319] ? do_syscall_64+0x1b9/0x820 [ 1422.468388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.473764] ? graph_lock+0x270/0x270 [ 1422.477572] __inet_stream_connect+0x992/0x1150 [ 1422.482272] ? tcp_v6_pre_connect+0x130/0x130 [ 1422.486790] ? __inet_stream_connect+0x992/0x1150 [ 1422.491640] ? inet_dgram_connect+0x2e0/0x2e0 [ 1422.496219] ? __lock_is_held+0xb5/0x140 [ 1422.500288] ? tcp_sendmsg_locked+0x2754/0x3f90 [ 1422.504956] ? rcu_read_lock_sched_held+0x108/0x120 [ 1422.509968] ? kmem_cache_alloc_trace+0x353/0x750 [ 1422.514817] tcp_sendmsg_locked+0x28e6/0x3f90 [ 1422.519319] ? lock_downgrade+0x900/0x900 [ 1422.523471] ? check_preemption_disabled+0x48/0x280 [ 1422.528492] ? tcp_sendpage+0x60/0x60 [ 1422.532305] ? find_held_lock+0x36/0x1c0 [ 1422.536394] ? mark_held_locks+0xc7/0x130 [ 1422.540561] ? __local_bh_enable_ip+0x160/0x260 [ 1422.545223] ? __local_bh_enable_ip+0x160/0x260 [ 1422.549895] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1422.554477] ? trace_hardirqs_on+0xbd/0x310 [ 1422.558797] ? lock_release+0xa00/0xa00 [ 1422.562769] ? lock_sock_nested+0xe2/0x120 [ 1422.567035] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1422.572502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.578041] ? check_preemption_disabled+0x48/0x280 [ 1422.583058] ? lock_sock_nested+0x9a/0x120 [ 1422.587290] ? lock_sock_nested+0x9a/0x120 [ 1422.591538] ? __local_bh_enable_ip+0x160/0x260 [ 1422.596225] tcp_sendmsg+0x2f/0x50 [ 1422.599763] inet_sendmsg+0x1a1/0x690 [ 1422.603583] ? ipip_gro_receive+0x100/0x100 [ 1422.607911] ? smack_socket_sendmsg+0xb0/0x190 [ 1422.612506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.618044] ? security_socket_sendmsg+0x94/0xc0 [ 1422.622796] ? ipip_gro_receive+0x100/0x100 [ 1422.627130] sock_sendmsg+0xd5/0x120 [ 1422.630846] __sys_sendto+0x3d7/0x670 [ 1422.634666] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1422.639361] ? wait_for_completion+0x8a0/0x8a0 [ 1422.643968] ? __lock_is_held+0xb5/0x140 [ 1422.648052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.653597] ? __sb_end_write+0xd9/0x110 [ 1422.657665] ? fput+0x130/0x1a0 [ 1422.660940] ? do_syscall_64+0x9a/0x820 [ 1422.664909] ? do_syscall_64+0x9a/0x820 [ 1422.668885] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1422.673464] ? trace_hardirqs_on+0xbd/0x310 [ 1422.677793] ? __ia32_sys_read+0xb0/0xb0 [ 1422.681855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.687235] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1422.692684] __x64_sys_sendto+0xe1/0x1a0 [ 1422.696747] do_syscall_64+0x1b9/0x820 [ 1422.700635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1422.705997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1422.710924] ? trace_hardirqs_on_caller+0x310/0x310 [ 1422.715937] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1422.720951] ? recalc_sigpending_tsk+0x180/0x180 [ 1422.725704] ? __switch_to_asm+0x40/0x70 [ 1422.729758] ? __switch_to_asm+0x34/0x70 [ 1422.733818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1422.738670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.743859] RIP: 0033:0x457759 [ 1422.747048] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1422.765955] RSP: 002b:00007f5e0abb0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1422.773654] RAX: ffffffffffffffda RBX: 00007f5e0abb0c90 RCX: 0000000000457759 [ 1422.780919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1422.788200] RBP: 000000000073bfa0 R08: 00000000208d4fe4 R09: 000000000000001c [ 1422.795491] R10: 0000000020000008 R11: 0000000000000246 R12: 00007f5e0abb16d4 [ 1422.802760] R13: 00000000004c4a7a R14: 00000000004d81c0 R15: 0000000000000006 02:17:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:23 executing program 0 (fault-call:2 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1422.920429] FAULT_INJECTION: forcing a failure. [ 1422.920429] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.982334] CPU: 0 PID: 32572 Comm: syz-executor0 Not tainted 4.20.0+ #167 [ 1422.989387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1422.998742] Call Trace: [ 1423.001345] dump_stack+0x1d3/0x2c6 [ 1423.005002] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1423.010207] ? find_held_lock+0x36/0x1c0 [ 1423.014297] should_fail.cold.4+0xa/0x17 [ 1423.018402] ? prep_compound_page+0x26c/0x390 [ 1423.022909] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1423.028031] ? set_pageblock_migratetype+0x40/0x40 [ 1423.033007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1423.038555] ? graph_lock+0x270/0x270 [ 1423.042379] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1423.047927] ? find_held_lock+0x36/0x1c0 [ 1423.052004] ? __lock_is_held+0xb5/0x140 [ 1423.056153] ? __btrfs_handle_fs_error+0x44/0x37c [ 1423.061030] ? ___might_sleep+0x1ed/0x300 [ 1423.065189] ? arch_local_save_flags+0x40/0x40 [ 1423.069797] __should_failslab+0x124/0x180 [ 1423.074044] should_failslab+0x9/0x14 [ 1423.077871] kmem_cache_alloc+0x2be/0x730 [ 1423.082101] __d_alloc+0xc8/0xb90 [ 1423.085567] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 1423.090591] ? __lock_acquire+0x62f/0x4c20 [ 1423.094844] ? graph_lock+0x270/0x270 [ 1423.098653] ? find_held_lock+0x36/0x1c0 [ 1423.102741] ? print_usage_bug+0xc0/0xc0 [ 1423.106810] ? mark_held_locks+0x130/0x130 [ 1423.111078] ? check_noncircular+0x20/0x20 [ 1423.115328] ? print_usage_bug+0xc0/0xc0 [ 1423.119411] d_alloc+0x96/0x380 [ 1423.122703] ? __d_alloc+0xb90/0xb90 [ 1423.126462] d_alloc_parallel+0x15a/0x1f40 [ 1423.130714] ? mark_held_locks+0x130/0x130 [ 1423.134987] ? __lock_acquire+0x62f/0x4c20 [ 1423.139242] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1423.143407] ? find_held_lock+0x36/0x1c0 [ 1423.147488] ? __d_lookup+0x591/0x9e0 [ 1423.151306] ? check_preemption_disabled+0x48/0x280 [ 1423.156368] ? kasan_check_read+0x11/0x20 [ 1423.160526] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1423.165837] ? rcu_softirq_qs+0x20/0x20 [ 1423.169841] ? __lockdep_init_map+0x105/0x590 [ 1423.174344] ? __lockdep_init_map+0x105/0x590 [ 1423.178865] ? lockdep_init_map+0x9/0x10 [ 1423.182929] ? __init_waitqueue_head+0x9e/0x150 [ 1423.187630] ? init_wait_entry+0x1c0/0x1c0 [ 1423.191883] ? lock_acquire+0x1ed/0x520 [ 1423.195898] __lookup_slow+0x1e6/0x540 [ 1423.199809] ? vfs_unlink+0x510/0x510 [ 1423.203691] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 1423.209623] lookup_slow+0x57/0x80 [ 1423.213175] walk_component+0x92b/0x25b0 [ 1423.217243] ? inode_permission+0xb2/0x560 [ 1423.221520] ? path_init+0x1ed0/0x1ed0 [ 1423.225428] ? walk_component+0x25b0/0x25b0 [ 1423.229764] ? __save_stack_trace+0x8d/0xf0 [ 1423.234122] ? save_stack+0xa9/0xd0 [ 1423.237771] ? save_stack+0x43/0xd0 [ 1423.241413] ? kasan_kmalloc+0xc7/0xe0 [ 1423.245315] ? kasan_slab_alloc+0x12/0x20 [ 1423.249483] path_lookupat.isra.43+0x212/0xc00 [ 1423.254070] ? path_parentat.isra.41+0x160/0x160 [ 1423.258861] ? cache_grow_end+0xa8/0x190 [ 1423.262960] ? lock_downgrade+0x900/0x900 [ 1423.267131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1423.272686] ? check_preemption_disabled+0x48/0x280 [ 1423.277726] filename_lookup+0x26a/0x520 [ 1423.281807] ? filename_parentat.isra.56+0x570/0x570 [ 1423.286927] ? rcu_read_lock_sched_held+0x108/0x120 [ 1423.291949] ? kmem_cache_alloc+0x33a/0x730 [ 1423.296278] ? memcpy+0x45/0x50 [ 1423.299561] ? getname_kernel+0x22a/0x370 [ 1423.303719] kern_path+0x33/0x40 [ 1423.307095] bpf_obj_get_user+0x174/0x610 [ 1423.311295] ? usercopy_warn+0x110/0x110 [ 1423.315372] ? bpf_obj_pin_user+0x4d0/0x4d0 [ 1423.319713] bpf_obj_get+0xbe/0x100 [ 1423.323344] __x64_sys_bpf+0x396/0x520 [ 1423.327246] ? bpf_prog_get+0x20/0x20 [ 1423.331070] do_syscall_64+0x1b9/0x820 [ 1423.334963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1423.340331] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1423.345271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1423.350118] ? trace_hardirqs_on_caller+0x310/0x310 [ 1423.355141] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1423.360173] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1423.365231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1423.370120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.375333] RIP: 0033:0x457759 [ 1423.378541] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1423.397473] RSP: 002b:00007fb5a5a05c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1423.405212] RAX: ffffffffffffffda RBX: 00007fb5a5a05c90 RCX: 0000000000457759 [ 1423.412479] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1423.419746] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1423.427013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5a5a066d4 02:17:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 1423.434279] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 [ 1423.443042] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:23 executing program 0 (fault-call:2 fault-nth:5): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1423.723764] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{0x1, 0x1, 0x7cd, 0x1}, 'syz0\x00', 0x28}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x2000) write$P9_RWALK(r1, &(0x7f00000000c0)={0x7e, 0x6f, 0x1, {0x9, [{0x0, 0x1, 0x4}, {0x2, 0x1, 0x3}, {0xf0555775fd2a30d0, 0x2, 0x2}, {0x43, 0x4}, {0x80, 0x4, 0x4}, {0x10, 0x2, 0x6}, {0x53, 0x1}, {0x0, 0x2, 0x5}, {0x91, 0x1, 0x8}]}}, 0x7e) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) write$P9_RREAD(r1, &(0x7f0000000140)={0x28, 0x75, 0x1, {0x1d, "b488bcb5da9b8cd1043653fd11eb270d8549d3ba563cedf303332c0dfe"}}, 0x28) 02:17:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x500000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 02:17:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x4800000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x9, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 1425.288643] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x200000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:27 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xe803000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:27 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2000000, 0x20080) sendmmsg$alg(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="8ddd3d45c6d21634fbcda58b55b80dfb3f63d71b3fcf65d501e084e3ad011bf92e41879852e35a46ca6e36258b2bd5e00c9e791d49fed8941bda89f4053fbb007559e81116c7abb4befd26f85a5745db5a21fa6afa3c5e4738e0849769", 0x5d}, {&(0x7f0000000140)="5cb4e48c08553b95740cfc828060fca8cd959c7c5c2758314f84a082c8c3ebb5dd52cd000faf0e807d717ef9857a4f889144c948dab9cc87981ce98d85c0a8ae02ada60d57d2d65ae6a811d6dfa07c009092b4b7368bd4c99c03", 0x5a}, {&(0x7f00000001c0)="73f75cb608b6775ebfb0f40d3e3d464f12536f67b0d57cba02faf38a98ad0a9afb86d99d59eff7f59ff42ae491df96ecc0ec7c2aa27fd0845199b482ac78975d1cac7b0898c3986dc9b345a72583dfa5e305d9a22063dd7c9448a12a89f7e83ee4c2a2515f15f53941cf84986629d19072f8b102fb26680e5c5e95bd21fd223a89", 0x81}], 0x3, &(0x7f0000000280)=[@assoc={0x18, 0x117, 0x4, 0x4}], 0x18, 0x10}, {0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000002c0)="6b644e7ffca5966fd4c3523a8e688b9876aa786e91ff84daff406ea3f9f83a9f6d3efa154c95c79a5efda5f5b634409b1bf7cf0a6e6798a7f38ddb6985288ce4708229d990f21f31cd37dcf3582e440ed6eb51e27ad3f65cec5af70b9540fdac80e078fee95a7385a57953ecb8df996b51b5ae2fa1d00d6dcc037de950aae4537f803397b28fe3c383892f928a5bfbd7ce0849033ca680f155f70576c0bb90e4cf4130da46e3fa28cc0229ac6226f34a01317d4f1964fca738d6d8f2e31f42a64ba6", 0xc2}, {&(0x7f00000003c0)="4f03b9249ed010d4d66f019be3feb19f69", 0x11}, {&(0x7f0000000400)="890bb3983347396053e9446fc03eec5453ae99dd82ea5854707854deaf627dd16adfb85102469ec6474dcc6e7d354d1a0f387d06f4f62720f9418cc5c277ada3d090f8c6e3219893b50e4f89d0ceeab00021f387a7f955999c7f81ae9e7922e1296cdb1b4260167c27954828b866703c0e68655d8a6848e5e5db12eaa7bacbe58b3503ecb28589ea300d", 0x8a}, {&(0x7f00000004c0)="0f55a4243a7ba2ff29be07dd955c8af2b0ae1b1a854f6f393f95131e4a4bacfef7659e1b871e6b186dcf085dd30098c23ff24301faad8b0fd54a605f4d124b165f4d78ee13ee03457b3992d2eed6e89db5d182b2aa3a8341c7704b92c331064fefd171d5daca1265933a0202ae0d34700fb3ad32", 0x74}, {&(0x7f0000000540)="23e8c2710293d32e596c28791522b8bd332fce13feacd93b6460321738e48d30ca42d6d57f12f7256201fc325416574fae1ff319cfdf1165dc46e993c134bc5cacd8fb00c219a5694157c04ece5987e105c8e43ae41523", 0x57}, {&(0x7f00000005c0)="9d6e48674bc41719f1079c97a5eabcfad8b8", 0x12}, {&(0x7f0000000600)="fe56cb3b6a02e226ad45942a8174fc8a2d3a4dd3ac3364d7b881168f8e38c5c36c774bfb34629e9e4bd14f0e9512c73474dd9e97fd01f2e1f2518d0eacc0103c84b0d55a8de329b9b245a5eaf37a840d47f8fddd51323764f3b8f30c2a20f453dccf1eab36b241c7e6", 0x69}, {&(0x7f0000000680)="a76ff9a92e01f1fb190ad0d8305b235b4ad59f63191cad1825f9c2650113bdbcd4efbe2a74f6b813bb3699619d1833923dddc4676952fbb6cbba05d07aaf4bc2207e8be2734e17fe0f43d9f2", 0x4c}, {&(0x7f0000000700)="2c3540e447b42314440752ce2c5c220a39d30a46fa7792546a99718cf16068956b8863d20892cbae73deff74b90f97c7e1495981f2bb293e2937242984e382af67f01de144cdae6f6e617ff175554c3acc4297579b6c45f49282b7ce51a3e393ae39b9f1037f24616dccedbf2a9a2f2fb95f1f318ba78e0fdeb143b1286f1abbff0fb7054edc6d3337347c83a0", 0x8d}, {&(0x7f00000007c0)="6e37199c2b7ee4c65182232b517119b6e1f95be0e297af40e2c32c44220bae83d9975f23e006625908dc44ff8e3cf5971871e2eb9ca958c0f8d8af675acae00a3e75d0250f9d59b2c13670446e63f9795cd85c0d2a42e1c5c1708f373223dc0a7794388a4f773e9d5c1618cd51e7dafcc3b0346c", 0x74}], 0xa, 0x0, 0x0, 0x4040000}], 0x2, 0xc0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0xa26, 0x3ff, 0xfffffffffffffff8, 0x94e}, 0xffffffffffffff51) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000980)={0x7fff, 0x0, 0x10001, 0xffff}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000009c0)={0x40, r2, 0x10002, 0x6}) 02:17:27 executing program 4 (fault-call:10 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x13, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1427.351751] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x7db5da54, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xfe0, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) connect$ax25(r0, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @bcast, @netrom, @remote, @bcast, @default, @default, @default]}, 0x48) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{}, [@null, @netrom, @null, @netrom, @null, @default, @netrom, @null]}, 0x10) [ 1427.458872] FAULT_INJECTION: forcing a failure. [ 1427.458872] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.522097] CPU: 0 PID: 32643 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1427.529137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1427.538495] Call Trace: [ 1427.541094] dump_stack+0x1d3/0x2c6 [ 1427.544735] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1427.549965] should_fail.cold.4+0xa/0x17 [ 1427.554063] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1427.559173] ? _raw_spin_unlock+0x2c/0x50 [ 1427.563323] ? __mutex_lock+0x85e/0x1700 [ 1427.567403] ? loop_control_ioctl+0x91/0x530 [ 1427.571827] ? graph_lock+0x270/0x270 [ 1427.575678] ? mutex_trylock+0x2b0/0x2b0 [ 1427.579796] ? find_held_lock+0x36/0x1c0 [ 1427.583864] ? __lock_is_held+0xb5/0x140 [ 1427.587938] ? ___might_sleep+0x1ed/0x300 [ 1427.592091] ? arch_local_save_flags+0x40/0x40 [ 1427.596681] ? find_held_lock+0x36/0x1c0 [ 1427.600760] __should_failslab+0x124/0x180 [ 1427.604999] should_failslab+0x9/0x14 [ 1427.608862] kmem_cache_alloc_trace+0x2d7/0x750 [ 1427.613567] loop_add+0xa3/0xa40 [ 1427.616964] ? loop_lookup+0x105/0x230 [ 1427.620861] ? loop_queue_rq+0x690/0x690 [ 1427.624943] loop_control_ioctl+0x199/0x530 [ 1427.629273] ? loop_add+0xa40/0xa40 [ 1427.632915] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1427.637860] ? loop_add+0xa40/0xa40 [ 1427.641502] do_vfs_ioctl+0x1de/0x1790 [ 1427.645423] ? __lock_is_held+0xb5/0x140 [ 1427.649505] ? ioctl_preallocate+0x300/0x300 [ 1427.653926] ? memset+0x31/0x40 [ 1427.657220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.662766] ? smack_file_ioctl+0x210/0x3c0 [ 1427.667096] ? fget_raw+0x20/0x20 [ 1427.670563] ? smack_file_lock+0x2e0/0x2e0 [ 1427.674816] ? fput+0x130/0x1a0 [ 1427.678126] ? do_syscall_64+0x9a/0x820 [ 1427.682121] ? do_syscall_64+0x9a/0x820 [ 1427.686110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.691659] ? security_file_ioctl+0x94/0xc0 [ 1427.696098] ksys_ioctl+0xa9/0xd0 [ 1427.699567] __x64_sys_ioctl+0x73/0xb0 [ 1427.703467] do_syscall_64+0x1b9/0x820 [ 1427.707372] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1427.712748] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1427.717686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1427.722542] ? trace_hardirqs_on_caller+0x310/0x310 [ 1427.727573] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1427.732607] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1427.737653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1427.742518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.747719] RIP: 0033:0x457759 [ 1427.750925] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1427.769832] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1427.777552] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1427.784830] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1427.792104] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1427.799398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1427.806686] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x4, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:28 executing program 4 (fault-call:10 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1427.893879] ax25_connect(): syz-executor5 uses autobind, please contact jreuter@yaina.de 02:17:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xa8bc, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:28 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1c000, 0x0, 0x40}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:17:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xb, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1427.984202] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1428.045716] FAULT_INJECTION: forcing a failure. [ 1428.045716] name failslab, interval 1, probability 0, space 0, times 0 [ 1428.082712] CPU: 1 PID: 32669 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1428.089749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.099117] Call Trace: [ 1428.101720] dump_stack+0x1d3/0x2c6 [ 1428.105382] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1428.110606] should_fail.cold.4+0xa/0x17 [ 1428.114683] ? rcu_softirq_qs+0x20/0x20 [ 1428.118673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1428.123821] ? graph_lock+0x270/0x270 [ 1428.127633] ? radix_tree_iter_tag_clear+0x90/0x90 [ 1428.132580] ? __save_stack_trace+0x8d/0xf0 [ 1428.136923] ? find_held_lock+0x36/0x1c0 [ 1428.140998] ? __lock_is_held+0xb5/0x140 [ 1428.145075] ? ___might_sleep+0x1ed/0x300 [ 1428.149232] ? arch_local_save_flags+0x40/0x40 [ 1428.153820] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1428.159375] ? node_tag_clear+0xc2/0x1c0 [ 1428.163452] __should_failslab+0x124/0x180 [ 1428.167692] should_failslab+0x9/0x14 [ 1428.171499] kmem_cache_alloc_node_trace+0x270/0x740 [ 1428.176608] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 1428.181461] __kmalloc_node+0x3c/0x70 [ 1428.185286] blk_mq_alloc_tag_set+0x385/0xad0 [ 1428.189783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.195366] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1428.200570] loop_add+0x2c9/0xa40 [ 1428.204029] ? loop_queue_rq+0x690/0x690 [ 1428.208132] loop_control_ioctl+0x199/0x530 [ 1428.212453] ? loop_add+0xa40/0xa40 [ 1428.216085] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1428.221060] ? loop_add+0xa40/0xa40 [ 1428.224697] do_vfs_ioctl+0x1de/0x1790 [ 1428.228603] ? __lock_is_held+0xb5/0x140 [ 1428.232671] ? ioctl_preallocate+0x300/0x300 [ 1428.237125] ? memset+0x31/0x40 [ 1428.240419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.245958] ? smack_file_ioctl+0x210/0x3c0 [ 1428.250290] ? fget_raw+0x20/0x20 [ 1428.253743] ? smack_file_lock+0x2e0/0x2e0 [ 1428.257981] ? fput+0x130/0x1a0 [ 1428.261257] ? do_syscall_64+0x9a/0x820 [ 1428.265234] ? do_syscall_64+0x9a/0x820 [ 1428.269232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.274797] ? security_file_ioctl+0x94/0xc0 [ 1428.279204] ksys_ioctl+0xa9/0xd0 [ 1428.282688] __x64_sys_ioctl+0x73/0xb0 [ 1428.286576] do_syscall_64+0x1b9/0x820 [ 1428.290462] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1428.295854] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1428.300795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.305636] ? trace_hardirqs_on_caller+0x310/0x310 [ 1428.310667] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1428.315697] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1428.320746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.325608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.330809] RIP: 0033:0x457759 [ 1428.334012] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1428.352921] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1428.360627] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1428.367892] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1428.375170] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1428.382444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1428.389715] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xd, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000880)=""/94, 0x5e}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00\x8e\xa1\x1d\\\xb1z\x80-\x95p\x1f\x19\xf2\x9e\x84\x8372\f\xcf\x9b\x1c\x87\xc5\x96\x8dJr\x05\xf5\xcd\xafd\xbav]\xc2\x1c>\xa3\xfda1\xa8\xb6W\\D\xb4\xde\xa9\t{\xb3\x84\x89K\xa8G\xf6\x9b\x8ba\x86\x05c<~\xa1\x9fI/\x8d\xfc\\%\x7f\x8c\xcb\x9a}.a\xe4\xf2\xaf\ns\xda\xbb&\xb7\xe4=\xfa') preadv(r0, &(0x7f0000000480), 0x1000000000000162, 0x0) 02:17:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xa, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:28 executing program 4 (fault-call:10 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1428.613556] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1428.636687] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1428.654494] FAULT_INJECTION: forcing a failure. [ 1428.654494] name failslab, interval 1, probability 0, space 0, times 0 [ 1428.686101] CPU: 1 PID: 32694 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1428.693146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.702500] Call Trace: [ 1428.705130] dump_stack+0x1d3/0x2c6 [ 1428.708795] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1428.714058] should_fail.cold.4+0xa/0x17 [ 1428.718145] ? kernel_text_address+0x79/0xf0 [ 1428.722561] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1428.727697] ? unwind_get_return_address+0x61/0xa0 [ 1428.732639] ? __save_stack_trace+0x8d/0xf0 [ 1428.736970] ? graph_lock+0x270/0x270 [ 1428.740773] ? save_stack+0xa9/0xd0 [ 1428.744426] ? find_held_lock+0x36/0x1c0 [ 1428.748530] ? __lock_is_held+0xb5/0x140 [ 1428.752620] ? ___might_sleep+0x1ed/0x300 [ 1428.756781] ? arch_local_save_flags+0x40/0x40 [ 1428.761383] __should_failslab+0x124/0x180 [ 1428.765655] should_failslab+0x9/0x14 [ 1428.769479] kmem_cache_alloc_node_trace+0x270/0x740 [ 1428.774621] ? kasan_unpoison_shadow+0x35/0x50 [ 1428.779214] __kmalloc_node+0x3c/0x70 [ 1428.783017] blk_mq_alloc_tag_set+0x41c/0xad0 [ 1428.787535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.793102] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1428.798315] loop_add+0x2c9/0xa40 [ 1428.801781] ? loop_queue_rq+0x690/0x690 [ 1428.805852] loop_control_ioctl+0x199/0x530 [ 1428.810180] ? loop_add+0xa40/0xa40 [ 1428.813823] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1428.818784] ? loop_add+0xa40/0xa40 [ 1428.822415] do_vfs_ioctl+0x1de/0x1790 [ 1428.826303] ? __lock_is_held+0xb5/0x140 [ 1428.830406] ? ioctl_preallocate+0x300/0x300 [ 1428.834830] ? memset+0x31/0x40 [ 1428.838129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.843685] ? smack_file_ioctl+0x210/0x3c0 [ 1428.848051] ? fget_raw+0x20/0x20 [ 1428.851505] ? smack_file_lock+0x2e0/0x2e0 [ 1428.855760] ? fput+0x130/0x1a0 [ 1428.859086] ? do_syscall_64+0x9a/0x820 [ 1428.863160] ? do_syscall_64+0x9a/0x820 [ 1428.867155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.872691] ? security_file_ioctl+0x94/0xc0 [ 1428.877116] ksys_ioctl+0xa9/0xd0 [ 1428.880617] __x64_sys_ioctl+0x73/0xb0 [ 1428.884512] do_syscall_64+0x1b9/0x820 [ 1428.888403] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1428.893785] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1428.898716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.903567] ? trace_hardirqs_on_caller+0x310/0x310 [ 1428.908590] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1428.913611] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1428.918640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.923539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.928731] RIP: 0033:0x457759 [ 1428.931928] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1428.950831] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1428.958537] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1428.966258] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1428.973622] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:17:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xc, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf0ffffff7f0000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1428.980899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1428.988175] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000880)=""/94, 0x5e}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00\x8e\xa1\x1d\\\xb1z\x80-\x95p\x1f\x19\xf2\x9e\x84\x8372\f\xcf\x9b\x1c\x87\xc5\x96\x8dJr\x05\xf5\xcd\xafd\xbav]\xc2\x1c>\xa3\xfda1\xa8\xb6W\\D\xb4\xde\xa9\t{\xb3\x84\x89K\xa8G\xf6\x9b\x8ba\x86\x05c<~\xa1\x9fI/\x8d\xfc\\%\x7f\x8c\xcb\x9a}.a\xe4\xf2\xaf\ns\xda\xbb&\xb7\xe4=\xfa') preadv(r0, &(0x7f0000000480), 0x1000000000000162, 0x0) 02:17:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x14, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:29 executing program 4 (fault-call:10 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x4002000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1429.257714] FAULT_INJECTION: forcing a failure. [ 1429.257714] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.294208] CPU: 1 PID: 32706 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1429.301237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.310612] Call Trace: [ 1429.313212] dump_stack+0x1d3/0x2c6 [ 1429.316854] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1429.322075] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1429.327051] should_fail.cold.4+0xa/0x17 [ 1429.331126] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1429.336243] ? kernel_text_address+0x79/0xf0 [ 1429.340658] ? __kernel_text_address+0xd/0x40 [ 1429.345155] ? graph_lock+0x270/0x270 [ 1429.348963] ? __save_stack_trace+0x8d/0xf0 [ 1429.353292] ? find_held_lock+0x36/0x1c0 [ 1429.357376] ? __lock_is_held+0xb5/0x140 [ 1429.361455] ? ___might_sleep+0x1ed/0x300 [ 1429.365608] ? arch_local_save_flags+0x40/0x40 [ 1429.370203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.375751] __should_failslab+0x124/0x180 [ 1429.379991] should_failslab+0x9/0x14 [ 1429.383798] kmem_cache_alloc_node_trace+0x270/0x740 [ 1429.388949] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1429.394487] ? find_next_bit+0x104/0x130 [ 1429.398562] blk_mq_init_tags+0x79/0x2b0 [ 1429.402648] blk_mq_alloc_rq_map+0x9f/0x220 [ 1429.406991] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1429.411496] blk_mq_alloc_tag_set+0x627/0xad0 [ 1429.416000] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1429.421221] loop_add+0x2c9/0xa40 [ 1429.424681] ? loop_queue_rq+0x690/0x690 [ 1429.428756] loop_control_ioctl+0x199/0x530 [ 1429.433080] ? loop_add+0xa40/0xa40 [ 1429.436726] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1429.441668] ? loop_add+0xa40/0xa40 [ 1429.445316] do_vfs_ioctl+0x1de/0x1790 [ 1429.449222] ? __lock_is_held+0xb5/0x140 [ 1429.453288] ? ioctl_preallocate+0x300/0x300 [ 1429.457699] ? memset+0x31/0x40 [ 1429.460978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.466528] ? smack_file_ioctl+0x210/0x3c0 [ 1429.470847] ? fget_raw+0x20/0x20 [ 1429.474294] ? smack_file_lock+0x2e0/0x2e0 [ 1429.478563] ? fput+0x130/0x1a0 [ 1429.481888] ? do_syscall_64+0x9a/0x820 [ 1429.485890] ? do_syscall_64+0x9a/0x820 [ 1429.489879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.495412] ? security_file_ioctl+0x94/0xc0 [ 1429.499837] ksys_ioctl+0xa9/0xd0 [ 1429.503318] __x64_sys_ioctl+0x73/0xb0 [ 1429.507250] do_syscall_64+0x1b9/0x820 [ 1429.511171] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1429.516535] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1429.521515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1429.526373] ? trace_hardirqs_on_caller+0x310/0x310 [ 1429.531397] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1429.536442] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1429.541468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1429.546328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.551522] RIP: 0033:0x457759 [ 1429.554719] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1429.573621] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1429.581332] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1429.588609] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1429.595880] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:17:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x11, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x601c1097, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1429.603150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1429.610418] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x15, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1429.700973] blk-mq: reduced tag depth (128 -> 64) 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x3, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:30 executing program 4 (fault-call:10 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1429.748244] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1429.771565] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:30 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) memfd_create(0x0, 0x0) signalfd4(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 02:17:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x240, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x8, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xe, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1429.995641] FAULT_INJECTION: forcing a failure. [ 1429.995641] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.035311] CPU: 0 PID: 32738 Comm: syz-executor4 Not tainted 4.20.0+ #167 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xf, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1430.043160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.043167] Call Trace: [ 1430.043192] dump_stack+0x1d3/0x2c6 [ 1430.043218] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1430.043250] should_fail.cold.4+0xa/0x17 [ 1430.043269] ? check_preemption_disabled+0x48/0x280 [ 1430.043292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1430.043312] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1430.043331] ? kasan_check_read+0x11/0x20 [ 1430.043362] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1430.043387] ? rcu_softirq_qs+0x20/0x20 [ 1430.043403] ? unwind_dump+0x190/0x190 [ 1430.043426] ? graph_lock+0x270/0x270 [ 1430.043447] ? is_bpf_text_address+0xd3/0x170 [ 1430.043471] ? find_held_lock+0x36/0x1c0 [ 1430.043495] ? __lock_is_held+0xb5/0x140 [ 1430.043511] ? ext4_readdir+0x3b8/0x36e0 [ 1430.043536] ? ___might_sleep+0x1ed/0x300 [ 1430.043550] ? save_stack+0xa9/0xd0 [ 1430.043565] ? arch_local_save_flags+0x40/0x40 [ 1430.043577] ? save_stack+0x43/0xd0 [ 1430.043590] ? kasan_kmalloc+0xc7/0xe0 [ 1430.043607] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1430.043631] ? blk_mq_init_tags+0x79/0x2b0 [ 1430.043648] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1430.043665] ? loop_add+0x2c9/0xa40 [ 1430.043687] __should_failslab+0x124/0x180 [ 1430.043704] should_failslab+0x9/0x14 [ 1430.043721] kmem_cache_alloc_node_trace+0x270/0x740 [ 1430.043750] __kmalloc_node+0x3c/0x70 [ 1430.043770] sbitmap_init_node+0x288/0x440 [ 1430.043792] sbitmap_queue_init_node+0xb2/0x850 [ 1430.043807] ? __lock_is_held+0xb5/0x140 [ 1430.043831] ? sbitmap_init_node+0x440/0x440 [ 1430.043844] ? blk_mq_init_tags+0x79/0x2b0 [ 1430.043862] ? rcu_read_lock_sched_held+0x108/0x120 [ 1430.043880] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1430.043899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1430.043914] ? find_next_bit+0x104/0x130 [ 1430.043936] blk_mq_init_tags+0x116/0x2b0 [ 1430.043955] blk_mq_alloc_rq_map+0x9f/0x220 [ 1430.043973] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1430.043993] blk_mq_alloc_tag_set+0x627/0xad0 [ 1430.044015] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1430.044041] loop_add+0x2c9/0xa40 [ 1430.044060] ? loop_queue_rq+0x690/0x690 [ 1430.044100] loop_control_ioctl+0x199/0x530 [ 1430.044115] ? loop_add+0xa40/0xa40 [ 1430.044142] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1430.044164] ? loop_add+0xa40/0xa40 [ 1430.044184] do_vfs_ioctl+0x1de/0x1790 [ 1430.044202] ? __lock_is_held+0xb5/0x140 [ 1430.044223] ? ioctl_preallocate+0x300/0x300 [ 1430.044237] ? memset+0x31/0x40 [ 1430.044254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.044269] ? smack_file_ioctl+0x210/0x3c0 [ 1430.044283] ? fget_raw+0x20/0x20 [ 1430.044300] ? smack_file_lock+0x2e0/0x2e0 [ 1430.044324] ? fput+0x130/0x1a0 [ 1430.044343] ? do_syscall_64+0x9a/0x820 [ 1430.044372] ? do_syscall_64+0x9a/0x820 [ 1430.044396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.044413] ? security_file_ioctl+0x94/0xc0 [ 1430.044440] ksys_ioctl+0xa9/0xd0 [ 1430.322431] __x64_sys_ioctl+0x73/0xb0 [ 1430.322450] do_syscall_64+0x1b9/0x820 [ 1430.322467] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 02:17:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x8004000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x5, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1430.322483] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1430.322496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1430.322513] ? trace_hardirqs_on_caller+0x310/0x310 [ 1430.322529] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1430.322544] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1430.322563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1430.322585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.322596] RIP: 0033:0x457759 [ 1430.322618] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1430.322626] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1430.322640] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1430.322648] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1430.322656] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1430.322665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1430.322673] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1430.373252] blk-mq: reduced tag depth (128 -> 64) [ 1430.438166] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x100000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x2, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:30 executing program 4 (fault-call:10 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1430.556262] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:30 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) connect$ax25(r0, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @bcast, @netrom, @remote, @bcast, @default, @default, @default]}, 0x48) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{0x3, @remote, 0x7ffffffff000}, [@null, @netrom, @null, @netrom, @null, @default, @netrom, @null]}, 0x48) 02:17:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x10, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x40000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1430.723805] ax25_connect(): syz-executor5 uses autobind, please contact jreuter@yaina.de [ 1430.757385] ax25_connect(): syz-executor5 uses autobind, please contact jreuter@yaina.de [ 1430.798346] FAULT_INJECTION: forcing a failure. [ 1430.798346] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.798755] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1430.824662] CPU: 1 PID: 313 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1430.831522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.840878] Call Trace: [ 1430.843484] dump_stack+0x1d3/0x2c6 [ 1430.847186] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1430.852427] should_fail.cold.4+0xa/0x17 [ 1430.856548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1430.861680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1430.867235] ? graph_lock+0x270/0x270 [ 1430.871057] ? find_held_lock+0x36/0x1c0 [ 1430.875140] ? __lock_is_held+0xb5/0x140 [ 1430.879222] ? ___might_sleep+0x1ed/0x300 [ 1430.883389] ? arch_local_save_flags+0x40/0x40 [ 1430.887985] ? __kmalloc_node+0x3c/0x70 [ 1430.891973] ? __kmalloc_node+0x3c/0x70 [ 1430.895972] __should_failslab+0x124/0x180 [ 1430.900222] should_failslab+0x9/0x14 [ 1430.904028] kmem_cache_alloc_node_trace+0x270/0x740 [ 1430.909142] ? check_preemption_disabled+0x48/0x280 [ 1430.914165] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1430.919189] ? find_next_bit+0x104/0x130 [ 1430.923258] sbitmap_queue_init_node+0x34d/0x850 [ 1430.928026] ? __lock_is_held+0xb5/0x140 [ 1430.932096] ? sbitmap_init_node+0x440/0x440 [ 1430.936507] ? blk_mq_init_tags+0x79/0x2b0 [ 1430.940753] ? rcu_read_lock_sched_held+0x108/0x120 [ 1430.945825] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1430.951103] ? find_next_bit+0x104/0x130 [ 1430.955210] blk_mq_init_tags+0x116/0x2b0 [ 1430.959421] blk_mq_alloc_rq_map+0x9f/0x220 [ 1430.964162] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1430.968667] blk_mq_alloc_tag_set+0x627/0xad0 [ 1430.973166] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1430.978369] loop_add+0x2c9/0xa40 [ 1430.981821] ? loop_queue_rq+0x690/0x690 [ 1430.985889] loop_control_ioctl+0x199/0x530 [ 1430.990243] ? loop_add+0xa40/0xa40 [ 1430.993877] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1430.998822] ? loop_add+0xa40/0xa40 [ 1431.002447] do_vfs_ioctl+0x1de/0x1790 [ 1431.006333] ? __lock_is_held+0xb5/0x140 [ 1431.010433] ? ioctl_preallocate+0x300/0x300 [ 1431.014888] ? memset+0x31/0x40 [ 1431.018173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.023709] ? smack_file_ioctl+0x210/0x3c0 [ 1431.028026] ? fget_raw+0x20/0x20 [ 1431.031476] ? smack_file_lock+0x2e0/0x2e0 [ 1431.035744] ? fput+0x130/0x1a0 [ 1431.039027] ? do_syscall_64+0x9a/0x820 [ 1431.043017] ? do_syscall_64+0x9a/0x820 [ 1431.046994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.052532] ? security_file_ioctl+0x94/0xc0 [ 1431.056969] ksys_ioctl+0xa9/0xd0 [ 1431.060447] __x64_sys_ioctl+0x73/0xb0 [ 1431.064365] do_syscall_64+0x1b9/0x820 [ 1431.068257] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1431.073625] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1431.078556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1431.083412] ? trace_hardirqs_on_caller+0x310/0x310 [ 1431.088434] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1431.093454] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1431.098482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1431.103349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.108549] RIP: 0033:0x457759 [ 1431.111741] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1431.130639] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1431.138345] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 02:17:31 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 02:17:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x100000000000000}, 0x10) [ 1431.145624] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1431.152907] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1431.160173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1431.167445] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1431.182488] blk-mq: reduced tag depth (128 -> 64) 02:17:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xebffffff}, 0x10) 02:17:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xa8bc0000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1431.372299] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:31 executing program 4 (fault-call:10 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x3f000000}, 0x10) 02:17:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x9000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x239ffffffffffff) [ 1431.725783] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1000000}, 0x10) 02:17:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf5ffffff, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:32 executing program 1: 02:17:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x239ffffffffffff) 02:17:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf725}, 0x10) [ 1431.922566] FAULT_INJECTION: forcing a failure. [ 1431.922566] name failslab, interval 1, probability 0, space 0, times 0 [ 1431.958154] CPU: 0 PID: 356 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1431.965011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1431.974378] Call Trace: [ 1431.976977] dump_stack+0x1d3/0x2c6 [ 1431.980632] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1431.985855] should_fail.cold.4+0xa/0x17 [ 1431.989937] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1431.995062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1432.000635] ? graph_lock+0x270/0x270 [ 1432.004502] ? find_held_lock+0x36/0x1c0 [ 1432.008604] ? __lock_is_held+0xb5/0x140 [ 1432.012705] ? ___might_sleep+0x1ed/0x300 [ 1432.016856] ? arch_local_save_flags+0x40/0x40 [ 1432.021478] ? __lockdep_init_map+0x105/0x590 [ 1432.026004] __should_failslab+0x124/0x180 [ 1432.030250] should_failslab+0x9/0x14 [ 1432.034095] kmem_cache_alloc_node_trace+0x270/0x740 [ 1432.039211] ? init_wait_entry+0x1c0/0x1c0 [ 1432.043459] ? check_preemption_disabled+0x48/0x280 [ 1432.048482] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1432.053521] sbitmap_queue_init_node+0x34d/0x850 [ 1432.058279] ? __lock_is_held+0xb5/0x140 [ 1432.062363] ? sbitmap_init_node+0x440/0x440 [ 1432.066782] ? blk_mq_init_tags+0x79/0x2b0 [ 1432.071057] ? rcu_read_lock_sched_held+0x108/0x120 [ 1432.076085] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1432.081381] ? find_next_bit+0x104/0x130 [ 1432.085462] blk_mq_init_tags+0x177/0x2b0 [ 1432.089629] blk_mq_alloc_rq_map+0x9f/0x220 [ 1432.093964] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1432.098504] blk_mq_alloc_tag_set+0x627/0xad0 [ 1432.103016] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1432.108224] loop_add+0x2c9/0xa40 [ 1432.111707] ? loop_queue_rq+0x690/0x690 [ 1432.115797] loop_control_ioctl+0x199/0x530 [ 1432.120130] ? loop_add+0xa40/0xa40 [ 1432.123778] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1432.128726] ? loop_add+0xa40/0xa40 [ 1432.132373] do_vfs_ioctl+0x1de/0x1790 [ 1432.136276] ? __lock_is_held+0xb5/0x140 [ 1432.140362] ? ioctl_preallocate+0x300/0x300 [ 1432.144778] ? memset+0x31/0x40 [ 1432.148089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.153656] ? smack_file_ioctl+0x210/0x3c0 [ 1432.158005] ? fget_raw+0x20/0x20 [ 1432.161468] ? smack_file_lock+0x2e0/0x2e0 [ 1432.165721] ? fput+0x130/0x1a0 [ 1432.169028] ? do_syscall_64+0x9a/0x820 [ 1432.173011] ? do_syscall_64+0x9a/0x820 [ 1432.176998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.182543] ? security_file_ioctl+0x94/0xc0 [ 1432.186965] ksys_ioctl+0xa9/0xd0 [ 1432.190438] __x64_sys_ioctl+0x73/0xb0 [ 1432.194340] do_syscall_64+0x1b9/0x820 [ 1432.198252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1432.203632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1432.208570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1432.213460] ? trace_hardirqs_on_caller+0x310/0x310 [ 1432.218486] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1432.223516] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1432.228546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1432.233421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.238626] RIP: 0033:0x457759 [ 1432.241827] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.260729] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1432.268441] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1432.275744] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1432.283035] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.290303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1432.297575] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1432.307315] blk-mq: reduced tag depth (128 -> 64) 02:17:32 executing program 4 (fault-call:10 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x18}, 0x10) 02:17:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x5000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x239ffffffffffff) [ 1432.332911] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:32 executing program 5: 02:17:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xc00000000000000}, 0x10) 02:17:32 executing program 1: 02:17:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x54dab57d, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:32 executing program 5: 02:17:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1800000000000000}, 0x10) [ 1432.588572] FAULT_INJECTION: forcing a failure. [ 1432.588572] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.604779] CPU: 0 PID: 386 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1432.611634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.611641] Call Trace: [ 1432.611664] dump_stack+0x1d3/0x2c6 [ 1432.611686] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1432.611709] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1432.627262] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1432.627276] ? loop_add+0x2c9/0xa40 [ 1432.627290] ? loop_control_ioctl+0x199/0x530 [ 1432.627319] ? ksys_ioctl+0xa9/0xd0 [ 1432.627340] should_fail.cold.4+0xa/0x17 [ 1432.657792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1432.662920] ? graph_lock+0x270/0x270 [ 1432.666734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.672279] ? check_preemption_disabled+0x48/0x280 [ 1432.677309] ? graph_lock+0x270/0x270 [ 1432.681120] ? __lock_is_held+0xb5/0x140 [ 1432.685203] ? __lockdep_init_map+0x105/0x590 [ 1432.689764] ? __lock_is_held+0xb5/0x140 [ 1432.693862] ? ___might_sleep+0x1ed/0x300 [ 1432.698034] ? arch_local_save_flags+0x40/0x40 [ 1432.702630] ? sbitmap_queue_init_node+0xce/0x850 [ 1432.707479] ? __lock_is_held+0xb5/0x140 [ 1432.711572] __should_failslab+0x124/0x180 [ 1432.715813] should_failslab+0x9/0x14 [ 1432.719627] kmem_cache_alloc_node_trace+0x270/0x740 [ 1432.724733] ? find_next_bit+0x104/0x130 [ 1432.728852] __kmalloc_node+0x3c/0x70 [ 1432.732659] blk_mq_alloc_rq_map+0xcc/0x220 [ 1432.737015] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1432.741551] blk_mq_alloc_tag_set+0x627/0xad0 [ 1432.746057] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1432.751263] loop_add+0x2c9/0xa40 [ 1432.754725] ? loop_queue_rq+0x690/0x690 [ 1432.758799] loop_control_ioctl+0x199/0x530 [ 1432.763122] ? loop_add+0xa40/0xa40 [ 1432.766773] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1432.771711] ? loop_add+0xa40/0xa40 [ 1432.775366] do_vfs_ioctl+0x1de/0x1790 [ 1432.779261] ? __lock_is_held+0xb5/0x140 [ 1432.783364] ? ioctl_preallocate+0x300/0x300 [ 1432.787809] ? memset+0x31/0x40 [ 1432.791096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.796638] ? smack_file_ioctl+0x210/0x3c0 [ 1432.800963] ? fget_raw+0x20/0x20 [ 1432.804417] ? smack_file_lock+0x2e0/0x2e0 [ 1432.808691] ? fput+0x130/0x1a0 [ 1432.811996] ? do_syscall_64+0x9a/0x820 [ 1432.815996] ? do_syscall_64+0x9a/0x820 [ 1432.819989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.825542] ? security_file_ioctl+0x94/0xc0 [ 1432.829956] ksys_ioctl+0xa9/0xd0 [ 1432.833421] __x64_sys_ioctl+0x73/0xb0 [ 1432.837332] do_syscall_64+0x1b9/0x820 [ 1432.841286] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1432.846668] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1432.851595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1432.856464] ? trace_hardirqs_on_caller+0x310/0x310 [ 1432.861484] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1432.866504] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1432.871532] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1432.876394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.881599] RIP: 0033:0x457759 [ 1432.884801] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.903716] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1432.911425] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1432.918716] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1432.925987] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.933270] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1432.940542] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1432.955614] blk-mq: reduced tag depth (128 -> 64) 02:17:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xc000000}, 0x10) [ 1432.985813] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 02:17:33 executing program 4 (fault-call:10 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:33 executing program 1: 02:17:33 executing program 5: 02:17:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf000}, 0x10) 02:17:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x1802, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:33 executing program 5: 02:17:33 executing program 1: 02:17:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x600}, 0x10) 02:17:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x54daab38, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1433.301918] FAULT_INJECTION: forcing a failure. [ 1433.301918] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.345349] CPU: 0 PID: 414 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1433.352233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.361586] Call Trace: [ 1433.364226] dump_stack+0x1d3/0x2c6 [ 1433.367901] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1433.373129] should_fail.cold.4+0xa/0x17 [ 1433.377212] ? kernel_text_address+0x79/0xf0 [ 1433.381648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1433.386773] ? unwind_get_return_address+0x61/0xa0 [ 1433.391713] ? __save_stack_trace+0x8d/0xf0 [ 1433.396090] ? graph_lock+0x270/0x270 [ 1433.399964] ? save_stack+0xa9/0xd0 [ 1433.403598] ? save_stack+0x43/0xd0 [ 1433.407238] ? kasan_kmalloc+0xc7/0xe0 [ 1433.411131] ? __kmalloc_node+0x50/0x70 [ 1433.415131] ? blk_mq_alloc_rq_map+0xcc/0x220 [ 1433.419635] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1433.424305] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1433.428977] ? loop_add+0x2c9/0xa40 [ 1433.432623] ? __lock_is_held+0xb5/0x140 [ 1433.436705] ? graph_lock+0x270/0x270 [ 1433.440524] ? check_preemption_disabled+0x48/0x280 [ 1433.445564] ? ___might_sleep+0x1ed/0x300 [ 1433.449715] ? arch_local_save_flags+0x40/0x40 [ 1433.454302] ? __lock_is_held+0xb5/0x140 [ 1433.458382] __should_failslab+0x124/0x180 [ 1433.462646] should_failslab+0x9/0x14 [ 1433.466471] kmem_cache_alloc_node_trace+0x270/0x740 [ 1433.471583] ? kasan_unpoison_shadow+0x35/0x50 [ 1433.476189] __kmalloc_node+0x3c/0x70 [ 1433.480026] blk_mq_alloc_rq_map+0x10d/0x220 [ 1433.484444] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1433.488963] blk_mq_alloc_tag_set+0x627/0xad0 [ 1433.493492] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1433.498731] loop_add+0x2c9/0xa40 [ 1433.502228] ? loop_queue_rq+0x690/0x690 [ 1433.506304] loop_control_ioctl+0x199/0x530 [ 1433.510635] ? loop_add+0xa40/0xa40 [ 1433.514280] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1433.519218] ? loop_add+0xa40/0xa40 [ 1433.522853] do_vfs_ioctl+0x1de/0x1790 [ 1433.526764] ? __lock_is_held+0xb5/0x140 [ 1433.530872] ? ioctl_preallocate+0x300/0x300 [ 1433.535287] ? memset+0x31/0x40 [ 1433.538590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.544150] ? smack_file_ioctl+0x210/0x3c0 [ 1433.548476] ? fget_raw+0x20/0x20 [ 1433.551936] ? smack_file_lock+0x2e0/0x2e0 [ 1433.556183] ? fput+0x130/0x1a0 [ 1433.559468] ? do_syscall_64+0x9a/0x820 [ 1433.563449] ? do_syscall_64+0x9a/0x820 [ 1433.567430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.572968] ? security_file_ioctl+0x94/0xc0 [ 1433.577399] ksys_ioctl+0xa9/0xd0 [ 1433.580875] __x64_sys_ioctl+0x73/0xb0 [ 1433.584783] do_syscall_64+0x1b9/0x820 [ 1433.588678] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1433.594062] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1433.598991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1433.603843] ? trace_hardirqs_on_caller+0x310/0x310 [ 1433.608868] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1433.613891] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1433.618936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1433.623807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.629001] RIP: 0033:0x457759 02:17:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf0ffff}, 0x10) 02:17:33 executing program 1: [ 1433.632196] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1433.651097] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1433.658832] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1433.666136] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1433.673442] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1433.680708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1433.687977] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1433.707070] blk-mq: reduced tag depth (128 -> 64) 02:17:34 executing program 4 (fault-call:10 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:34 executing program 5: 02:17:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x2}, 0x10) 02:17:34 executing program 1: 02:17:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfe80, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:34 executing program 5: 02:17:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x25f7}, 0x10) 02:17:34 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x239ffffffffffff) 02:17:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x12000000}, 0x10) [ 1433.961410] FAULT_INJECTION: forcing a failure. [ 1433.961410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1433.994331] CPU: 1 PID: 440 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1434.001204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1434.010567] Call Trace: [ 1434.013174] dump_stack+0x1d3/0x2c6 [ 1434.016822] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1434.022034] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1434.026996] should_fail.cold.4+0xa/0x17 [ 1434.031076] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1434.036204] ? graph_lock+0x270/0x270 [ 1434.040019] ? find_held_lock+0x36/0x1c0 [ 1434.044127] ? is_bpf_text_address+0xac/0x170 [ 1434.048643] ? __lock_is_held+0xb5/0x140 [ 1434.052755] ? rcu_softirq_qs+0x20/0x20 [ 1434.056746] ? ___might_sleep+0x1ed/0x300 [ 1434.060909] ? arch_local_save_flags+0x40/0x40 [ 1434.065507] ? is_bpf_text_address+0xd3/0x170 [ 1434.070015] ? __might_sleep+0x95/0x190 [ 1434.074007] __alloc_pages_nodemask+0x366/0xea0 [ 1434.078699] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 1434.083731] ? save_stack+0xa9/0xd0 [ 1434.087379] ? save_stack+0x43/0xd0 [ 1434.091013] ? kasan_kmalloc+0xc7/0xe0 [ 1434.094920] ? __kmalloc_node+0x50/0x70 [ 1434.098911] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1434.103505] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1434.108189] ? __x64_sys_ioctl+0x73/0xb0 [ 1434.112261] ? do_syscall_64+0x1b9/0x820 [ 1434.116419] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.121801] ? graph_lock+0x270/0x270 [ 1434.125615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1434.131178] ? find_next_bit+0x104/0x130 [ 1434.135305] ? __cpu_to_node+0x7d/0xa0 [ 1434.139255] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1434.144120] blk_mq_alloc_rqs+0x31c/0x980 [ 1434.148310] ? blk_mq_alloc_rq_map+0x220/0x220 [ 1434.152928] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1434.158242] ? kasan_unpoison_shadow+0x35/0x50 [ 1434.162845] ? __kmalloc_node+0x50/0x70 [ 1434.166846] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 1434.171447] blk_mq_alloc_tag_set+0x627/0xad0 [ 1434.175962] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1434.181190] loop_add+0x2c9/0xa40 [ 1434.184660] ? loop_queue_rq+0x690/0x690 [ 1434.188745] loop_control_ioctl+0x199/0x530 [ 1434.193082] ? loop_add+0xa40/0xa40 [ 1434.196735] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1434.201684] ? loop_add+0xa40/0xa40 [ 1434.205364] do_vfs_ioctl+0x1de/0x1790 [ 1434.209297] ? __lock_is_held+0xb5/0x140 [ 1434.213401] ? ioctl_preallocate+0x300/0x300 [ 1434.217822] ? memset+0x31/0x40 [ 1434.221126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.226680] ? smack_file_ioctl+0x210/0x3c0 [ 1434.231011] ? fget_raw+0x20/0x20 [ 1434.234493] ? smack_file_lock+0x2e0/0x2e0 [ 1434.238746] ? fput+0x130/0x1a0 [ 1434.242045] ? do_syscall_64+0x9a/0x820 [ 1434.246037] ? do_syscall_64+0x9a/0x820 [ 1434.250085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.255669] ? security_file_ioctl+0x94/0xc0 [ 1434.260096] ksys_ioctl+0xa9/0xd0 [ 1434.263572] __x64_sys_ioctl+0x73/0xb0 [ 1434.267479] do_syscall_64+0x1b9/0x820 [ 1434.271385] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1434.276767] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1434.281705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1434.286561] ? trace_hardirqs_on_caller+0x310/0x310 [ 1434.291595] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1434.296626] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1434.301659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1434.306523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.311735] RIP: 0033:0x457759 [ 1434.314950] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1434.333870] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1434.341588] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1434.348861] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1434.356142] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 02:17:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00c\xaf\xb6\xb1*\x8b[\xc5\xf9~\x8e\xf3\x9em\'\xd0#9\xad6H5W\x15\xadD_\xd5\xd1Q\xec\x1c\xd7\xed-\xa7l\xd1x\r\xd5<\xf1\xfd\xda+\xccc\xeer\xac\x9a7_\xbf\xf37DW\xb9\xda\xdf\xa1\x17\'\xe1\x8b=\x910\xcc\x81\x86\x8cI\xb8\xb6UD\xc5\xc8\xa9\xa4\xf4_\xcc\x8c\xcf', 0x200002, 0x0) fchdir(r0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000e80)='./bus\x00') [ 1434.363413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1434.370683] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x3f00}, 0x10) 02:17:34 executing program 4 (fault-call:10 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffff8d, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x100000000000024e, 0x4e) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:17:34 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)) 02:17:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1800}, 0x10) 02:17:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000680)="0a5c1f023c126285719070") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x600, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x6}, 0x10) [ 1434.706730] FAULT_INJECTION: forcing a failure. [ 1434.706730] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.725433] CPU: 0 PID: 474 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1434.732295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1434.741660] Call Trace: [ 1434.744294] dump_stack+0x1d3/0x2c6 [ 1434.747948] ? dump_stack_print_info.cold.1+0x20/0x20 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1200000000000000}, 0x10) [ 1434.753168] ? is_bpf_text_address+0xac/0x170 [ 1434.757695] should_fail.cold.4+0xa/0x17 [ 1434.761774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1434.766891] ? check_preemption_disabled+0x48/0x280 [ 1434.771938] ? __lock_is_held+0xb5/0x140 [ 1434.776012] ? graph_lock+0x270/0x270 [ 1434.779836] ? find_held_lock+0x36/0x1c0 [ 1434.783917] ? __lock_is_held+0xb5/0x140 [ 1434.788002] ? ___might_sleep+0x1ed/0x300 [ 1434.792163] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1434.796757] ? arch_local_save_flags+0x40/0x40 [ 1434.801362] ? __x64_sys_ioctl+0x73/0xb0 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xfffff000}, 0x10) [ 1434.805452] __should_failslab+0x124/0x180 [ 1434.809702] should_failslab+0x9/0x14 [ 1434.813521] kmem_cache_alloc_node+0x26e/0x730 [ 1434.818125] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1434.823231] blk_alloc_queue_node+0xed/0xe80 [ 1434.827664] ? blk_init_allocated_queue+0x640/0x640 [ 1434.832692] ? __mutex_init+0x1f7/0x290 [ 1434.836682] ? psi_task_change.cold.11+0x1ac/0x1ac [ 1434.841648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.847198] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1434.851969] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1434.856666] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1434.861879] blk_mq_init_queue+0x4b/0xb0 [ 1434.865957] loop_add+0x376/0xa40 [ 1434.869432] ? loop_queue_rq+0x690/0x690 [ 1434.873522] loop_control_ioctl+0x199/0x530 [ 1434.877858] ? loop_add+0xa40/0xa40 [ 1434.881588] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1434.886541] ? loop_add+0xa40/0xa40 [ 1434.890189] do_vfs_ioctl+0x1de/0x1790 [ 1434.894083] ? __lock_is_held+0xb5/0x140 [ 1434.898151] ? ioctl_preallocate+0x300/0x300 [ 1434.902564] ? memset+0x31/0x40 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x3f00000000000000}, 0x10) [ 1434.905867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.911441] ? smack_file_ioctl+0x210/0x3c0 [ 1434.915806] ? fget_raw+0x20/0x20 [ 1434.919267] ? smack_file_lock+0x2e0/0x2e0 [ 1434.923515] ? fput+0x130/0x1a0 [ 1434.926799] ? do_syscall_64+0x9a/0x820 [ 1434.930789] ? do_syscall_64+0x9a/0x820 [ 1434.934775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.940319] ? security_file_ioctl+0x94/0xc0 [ 1434.944787] ksys_ioctl+0xa9/0xd0 [ 1434.948267] __x64_sys_ioctl+0x73/0xb0 [ 1434.952178] do_syscall_64+0x1b9/0x820 [ 1434.956071] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1434.961455] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1434.966552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1434.971408] ? trace_hardirqs_on_caller+0x310/0x310 [ 1434.976432] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1434.981462] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1434.986510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1434.991383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.996593] RIP: 0033:0x457759 [ 1434.999879] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1435.019110] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1435.026821] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1435.034087] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1435.041371] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1435.048644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1435.055932] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:35 executing program 4 (fault-call:10 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x600000000000000}, 0x10) 02:17:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x1802, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x54dab57d, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xebffffff00000000}, 0x10) 02:17:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x900, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1435.239526] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1435.296708] FAULT_INJECTION: forcing a failure. [ 1435.296708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1435.308558] CPU: 1 PID: 505 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1435.315395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1435.324789] Call Trace: [ 1435.327417] dump_stack+0x1d3/0x2c6 [ 1435.331062] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1435.336305] ? find_held_lock+0x36/0x1c0 [ 1435.340391] should_fail.cold.4+0xa/0x17 [ 1435.344459] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1435.349565] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1435.354494] ? kasan_check_read+0x11/0x20 [ 1435.358647] ? mark_held_locks+0x130/0x130 [ 1435.362906] ? graph_lock+0x270/0x270 [ 1435.366715] ? find_held_lock+0x36/0x1c0 [ 1435.370791] ? is_bpf_text_address+0xac/0x170 [ 1435.375348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.380915] ? should_fail+0x22d/0xd01 [ 1435.384814] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1435.389944] ? check_preemption_disabled+0x48/0x280 [ 1435.395013] __alloc_pages_nodemask+0x366/0xea0 [ 1435.399704] ? __lock_is_held+0xb5/0x140 [ 1435.403766] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 1435.408786] ? find_held_lock+0x36/0x1c0 [ 1435.412855] ? ___might_sleep+0x1ed/0x300 [ 1435.417016] ? trace_hardirqs_off+0xb8/0x310 [ 1435.421432] cache_grow_begin+0x91/0x8c0 [ 1435.425492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1435.431055] ? check_preemption_disabled+0x48/0x280 [ 1435.436078] kmem_cache_alloc_node+0x667/0x730 [ 1435.440706] blk_alloc_queue_node+0xed/0xe80 [ 1435.445123] ? blk_init_allocated_queue+0x640/0x640 [ 1435.450146] ? __mutex_init+0x1f7/0x290 [ 1435.454127] ? psi_task_change.cold.11+0x1ac/0x1ac [ 1435.459098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.464640] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1435.469399] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1435.474071] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1435.479265] blk_mq_init_queue+0x4b/0xb0 [ 1435.483323] loop_add+0x376/0xa40 [ 1435.486800] ? loop_queue_rq+0x690/0x690 [ 1435.490911] loop_control_ioctl+0x199/0x530 [ 1435.495228] ? loop_add+0xa40/0xa40 [ 1435.498878] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1435.503825] ? loop_add+0xa40/0xa40 [ 1435.507451] do_vfs_ioctl+0x1de/0x1790 [ 1435.511363] ? __lock_is_held+0xb5/0x140 [ 1435.515446] ? ioctl_preallocate+0x300/0x300 [ 1435.519851] ? memset+0x31/0x40 [ 1435.523136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.528670] ? smack_file_ioctl+0x210/0x3c0 [ 1435.533005] ? fget_raw+0x20/0x20 [ 1435.536457] ? smack_file_lock+0x2e0/0x2e0 [ 1435.540708] ? fput+0x130/0x1a0 [ 1435.543993] ? do_syscall_64+0x9a/0x820 [ 1435.548007] ? do_syscall_64+0x9a/0x820 [ 1435.552022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.557557] ? security_file_ioctl+0x94/0xc0 [ 1435.561971] ksys_ioctl+0xa9/0xd0 [ 1435.565444] __x64_sys_ioctl+0x73/0xb0 [ 1435.569376] do_syscall_64+0x1b9/0x820 [ 1435.573265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1435.578632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1435.583563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1435.588414] ? trace_hardirqs_on_caller+0x310/0x310 [ 1435.593433] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1435.598470] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1435.603513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1435.608376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.613563] RIP: 0033:0x457759 [ 1435.616759] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1435.635663] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x5000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf725000000000000}, 0x10) [ 1435.643378] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1435.650678] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1435.657992] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1435.665273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1435.672538] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x6000000}, 0x10) 02:17:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf5ffffff, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:36 executing program 4 (fault-call:10 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x3f00000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x12}, 0x10) 02:17:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x9, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x4002000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf0ffffff7f0000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf0ffffffffffff}, 0x10) 02:17:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x400000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x7db5da54, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, &(0x7f0000000500)=[{&(0x7f0000000180)="ea9ecc4e6b2b1c9544f7fdcbb7ac0398f6aff523cf54d0db805c2b2b588aae5398cb43f3bd2175cea62ba9d4ec74f8ceab91", 0x32, 0x9}, {&(0x7f0000000280)="64383ade25c8df87ff0fee98d0399a1d21a09f000576f93e6988aa84e84b6f2637b37b155676177f7c2912dfae4b2e33ecc8e1ddb383276badb0365711ef790a658872443bce6754fdc637d3e5a029371d02dece6ba204805ff0d7a50d617156e703815e289e74bc24b2106b9a999dad32ad5b3114e40f2fd5eafaca083d8fc779bb032503fa58d67dd8d3b4ce81a9454174acac2b0c0961a27bda39f055303f48fb8415e9a155a5284258508f7f34b4adc9b6d046f88a95d7ca4c40bf3327836118262db24b7265bacb8c636f147600c0259159f6598d3c13dd78", 0xdb, 0x9}, {&(0x7f00000001c0)="c6b6d515ebe05adc8fe513f80e1ed42bddc1976046cc841382c7da5d82eb9de3c299430fb9f658f400e7e564c767a11f3894a861b64136e06fb3c13fadf2f7f7c412a86a6ac29227426f8df1da6623f9c94b6eb9c6d546a5fc9b0e06", 0x5c}, {&(0x7f0000000380)="de1e70636d954456bbadf12dc498d3a55b7915e862c17b7205136cda38133f8b96a06417d86bd42143e504764567f2466b2dfb2d59a5e64288ceaf5b9ee3a3f74acb4ff251d81fe4479d7c3177395580d5e36c87902e1929dc48e1e111e8dcc2b7d89848ac46d391620ff7657ffb65edff56de572b9170167e3a0d913a3411f9472f237d01d605664e4762322dfe382d4dc2aa753aaa708ddda1132db7affb64eb628ea16c5911386d180c707ed95a3b5af2ba9bb88f722b77b58f3f05cb131a2aa3901f880a", 0xc6, 0x20}, {&(0x7f0000000480)='_', 0x1, 0x4}, {&(0x7f00000004c0)="f46dfe", 0x3, 0x80000000}], 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x5400000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1436.132608] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1436.328129] FAULT_INJECTION: forcing a failure. [ 1436.328129] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.341430] CPU: 0 PID: 561 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1436.348287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.357643] Call Trace: [ 1436.360242] dump_stack+0x1d3/0x2c6 [ 1436.363897] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1436.369150] should_fail.cold.4+0xa/0x17 [ 1436.373216] ? __kernel_text_address+0xd/0x40 [ 1436.377717] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1436.382829] ? __save_stack_trace+0x8d/0xf0 [ 1436.387168] ? graph_lock+0x270/0x270 [ 1436.390980] ? save_stack+0xa9/0xd0 [ 1436.394636] ? save_stack+0x43/0xd0 [ 1436.398268] ? kasan_kmalloc+0xc7/0xe0 [ 1436.402169] ? find_held_lock+0x36/0x1c0 [ 1436.406245] ? __lock_is_held+0xb5/0x140 [ 1436.410324] ? ___might_sleep+0x1ed/0x300 [ 1436.414487] ? arch_local_save_flags+0x40/0x40 [ 1436.419088] ? __lock_is_held+0xb5/0x140 [ 1436.423194] __should_failslab+0x124/0x180 [ 1436.427432] should_failslab+0x9/0x14 [ 1436.431234] kmem_cache_alloc+0x2be/0x730 [ 1436.435403] ? kasan_kmalloc+0xc7/0xe0 [ 1436.439310] ? mempool_free+0x370/0x370 [ 1436.443286] mempool_alloc_slab+0x44/0x60 [ 1436.447439] mempool_init_node+0x2d2/0x550 [ 1436.451676] ? mempool_free+0x370/0x370 [ 1436.455653] ? mempool_alloc_slab+0x60/0x60 [ 1436.459975] mempool_init+0x3d/0x50 [ 1436.463609] bioset_init+0x3d4/0x840 [ 1436.467336] ? bioset_exit+0x370/0x370 [ 1436.471237] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1436.476259] blk_alloc_queue_node+0x287/0xe80 [ 1436.480758] ? blk_init_allocated_queue+0x640/0x640 [ 1436.485776] ? __mutex_init+0x1f7/0x290 [ 1436.489811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.495391] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1436.500157] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1436.504878] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1436.510116] blk_mq_init_queue+0x4b/0xb0 [ 1436.514185] loop_add+0x376/0xa40 [ 1436.517668] ? loop_queue_rq+0x690/0x690 [ 1436.521751] loop_control_ioctl+0x199/0x530 [ 1436.526079] ? loop_add+0xa40/0xa40 [ 1436.529751] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1436.534690] ? loop_add+0xa40/0xa40 [ 1436.538323] do_vfs_ioctl+0x1de/0x1790 [ 1436.542226] ? __lock_is_held+0xb5/0x140 [ 1436.546296] ? ioctl_preallocate+0x300/0x300 [ 1436.550707] ? memset+0x31/0x40 [ 1436.554012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.559554] ? smack_file_ioctl+0x210/0x3c0 [ 1436.563880] ? fget_raw+0x20/0x20 [ 1436.567343] ? smack_file_lock+0x2e0/0x2e0 [ 1436.571603] ? fput+0x130/0x1a0 [ 1436.574899] ? do_syscall_64+0x9a/0x820 [ 1436.578877] ? do_syscall_64+0x9a/0x820 [ 1436.582884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.588427] ? security_file_ioctl+0x94/0xc0 [ 1436.592846] ksys_ioctl+0xa9/0xd0 [ 1436.596326] __x64_sys_ioctl+0x73/0xb0 [ 1436.600238] do_syscall_64+0x1b9/0x820 [ 1436.604141] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1436.609518] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1436.614458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1436.619313] ? trace_hardirqs_on_caller+0x310/0x310 [ 1436.624342] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1436.629404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1436.634448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1436.639322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.644519] RIP: 0033:0x457759 [ 1436.647719] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1436.666631] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:17:36 executing program 4 (fault-call:10 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xffffffff00000000}, 0x10) 02:17:36 executing program 5 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 02:17:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x6000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1436.674397] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1436.681673] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1436.688945] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1436.696218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1436.703491] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1436.771551] FAULT_INJECTION: forcing a failure. [ 1436.771551] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.812317] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1436.817504] FAULT_INJECTION: forcing a failure. [ 1436.817504] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.840230] CPU: 1 PID: 565 Comm: syz-executor5 Not tainted 4.20.0+ #167 [ 1436.847104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.856489] Call Trace: [ 1436.859139] dump_stack+0x1d3/0x2c6 [ 1436.862821] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1436.868066] ? lock_downgrade+0x900/0x900 [ 1436.872247] should_fail.cold.4+0xa/0x17 [ 1436.876342] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1436.881495] ? lock_downgrade+0x900/0x900 [ 1436.885664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1436.891215] ? proc_fail_nth_write+0x9e/0x210 [ 1436.895725] ? proc_cwd_link+0x1d0/0x1d0 [ 1436.899806] ? find_held_lock+0x36/0x1c0 [ 1436.903903] ? ___might_sleep+0x1ed/0x300 [ 1436.908080] ? arch_local_save_flags+0x40/0x40 [ 1436.912690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.918246] __should_failslab+0x124/0x180 [ 1436.922499] should_failslab+0x9/0x14 [ 1436.926311] __kmalloc+0x2e0/0x770 [ 1436.929862] ? strncpy_from_user+0x510/0x510 [ 1436.934281] ? fput+0x130/0x1a0 [ 1436.937594] ? do_syscall_64+0x9a/0x820 [ 1436.941620] ? __x64_sys_memfd_create+0x142/0x4f0 [ 1436.946518] ? do_syscall_64+0x9a/0x820 [ 1436.950523] __x64_sys_memfd_create+0x142/0x4f0 [ 1436.955203] ? memfd_fcntl+0x1910/0x1910 [ 1436.959284] do_syscall_64+0x1b9/0x820 [ 1436.963186] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1436.969079] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1436.974026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1436.978901] ? trace_hardirqs_on_caller+0x310/0x310 [ 1436.983935] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1436.988966] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1436.994003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1436.999462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.004655] RIP: 0033:0x457759 [ 1437.007855] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.026777] RSP: 002b:00007f58d1a84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1437.034495] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457759 [ 1437.041794] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc8f6 [ 1437.049101] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1437.056411] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58d1a856d4 02:17:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x200000000000000}, 0x10) [ 1437.063695] R13: 00000000004c5bed R14: 00000000004da8f0 R15: 0000000000000005 [ 1437.071136] CPU: 0 PID: 577 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1437.078017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.087376] Call Trace: [ 1437.089975] dump_stack+0x1d3/0x2c6 [ 1437.093611] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1437.098836] should_fail.cold.4+0xa/0x17 [ 1437.102901] ? __kernel_text_address+0xd/0x40 [ 1437.107413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1437.112518] ? __save_stack_trace+0x8d/0xf0 [ 1437.116857] ? graph_lock+0x270/0x270 [ 1437.120659] ? save_stack+0xa9/0xd0 [ 1437.124288] ? save_stack+0x43/0xd0 [ 1437.127918] ? kasan_kmalloc+0xc7/0xe0 [ 1437.131815] ? find_held_lock+0x36/0x1c0 [ 1437.135896] ? __lock_is_held+0xb5/0x140 [ 1437.139987] ? ___might_sleep+0x1ed/0x300 [ 1437.144140] ? arch_local_save_flags+0x40/0x40 [ 1437.148723] ? __lock_is_held+0xb5/0x140 [ 1437.152799] __should_failslab+0x124/0x180 [ 1437.157041] should_failslab+0x9/0x14 [ 1437.160847] kmem_cache_alloc+0x2be/0x730 [ 1437.165018] ? kasan_kmalloc+0xc7/0xe0 [ 1437.168925] ? mempool_free+0x370/0x370 [ 1437.172901] mempool_alloc_slab+0x44/0x60 [ 1437.177051] mempool_init_node+0x2d2/0x550 [ 1437.181296] ? mempool_free+0x370/0x370 [ 1437.185285] ? mempool_alloc_slab+0x60/0x60 [ 1437.189643] mempool_init+0x3d/0x50 [ 1437.193277] bioset_init+0x3d4/0x840 [ 1437.197017] ? bioset_exit+0x370/0x370 [ 1437.200933] blk_alloc_queue_node+0x287/0xe80 [ 1437.205438] ? blk_init_allocated_queue+0x640/0x640 [ 1437.210458] ? __mutex_init+0x1f7/0x290 [ 1437.214460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.220000] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1437.224762] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1437.229441] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1437.234642] blk_mq_init_queue+0x4b/0xb0 [ 1437.238708] loop_add+0x376/0xa40 [ 1437.242167] ? loop_queue_rq+0x690/0x690 [ 1437.246257] loop_control_ioctl+0x199/0x530 [ 1437.250582] ? loop_add+0xa40/0xa40 [ 1437.254228] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1437.259164] ? loop_add+0xa40/0xa40 [ 1437.262793] do_vfs_ioctl+0x1de/0x1790 [ 1437.266684] ? __lock_is_held+0xb5/0x140 [ 1437.270751] ? ioctl_preallocate+0x300/0x300 [ 1437.275158] ? memset+0x31/0x40 [ 1437.278443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.283986] ? smack_file_ioctl+0x210/0x3c0 [ 1437.288338] ? fget_raw+0x20/0x20 [ 1437.291811] ? smack_file_lock+0x2e0/0x2e0 [ 1437.296072] ? fput+0x130/0x1a0 [ 1437.299384] ? do_syscall_64+0x9a/0x820 [ 1437.303372] ? do_syscall_64+0x9a/0x820 [ 1437.307369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.312925] ? security_file_ioctl+0x94/0xc0 [ 1437.317345] ksys_ioctl+0xa9/0xd0 [ 1437.320814] __x64_sys_ioctl+0x73/0xb0 [ 1437.324705] do_syscall_64+0x1b9/0x820 [ 1437.328602] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1437.333974] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1437.338905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1437.343756] ? trace_hardirqs_on_caller+0x310/0x310 [ 1437.348777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1437.353798] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1437.358835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1437.363689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.368902] RIP: 0033:0x457759 [ 1437.372133] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.391034] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1437.398763] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1437.406031] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1437.413298] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1437.420566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1437.427860] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:37 executing program 5 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x8000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x18000000}, 0x10) [ 1437.545833] FAULT_INJECTION: forcing a failure. [ 1437.545833] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.579219] CPU: 0 PID: 587 Comm: syz-executor5 Not tainted 4.20.0+ #167 [ 1437.586104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.595467] Call Trace: [ 1437.598109] dump_stack+0x1d3/0x2c6 [ 1437.601760] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1437.607007] should_fail.cold.4+0xa/0x17 [ 1437.611089] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1437.616225] ? find_held_lock+0x36/0x1c0 [ 1437.620304] ? graph_lock+0x270/0x270 [ 1437.624178] ? __lock_acquire+0x62f/0x4c20 [ 1437.628423] ? lock_downgrade+0x900/0x900 [ 1437.628440] ? check_preemption_disabled+0x48/0x280 [ 1437.628462] ? find_held_lock+0x36/0x1c0 [ 1437.628491] ? ___might_sleep+0x1ed/0x300 [ 1437.637647] ? expand_files.part.8+0x571/0x9a0 [ 1437.637664] ? arch_local_save_flags+0x40/0x40 [ 1437.637685] ? find_held_lock+0x36/0x1c0 [ 1437.637708] __should_failslab+0x124/0x180 [ 1437.637726] should_failslab+0x9/0x14 [ 1437.667180] kmem_cache_alloc+0x2be/0x730 [ 1437.671349] ? shmem_destroy_callback+0xc0/0xc0 [ 1437.676041] shmem_alloc_inode+0x1b/0x40 [ 1437.680115] alloc_inode+0x63/0x190 [ 1437.683753] new_inode_pseudo+0x71/0x1a0 [ 1437.687828] ? prune_icache_sb+0x1c0/0x1c0 [ 1437.692080] ? _raw_spin_unlock+0x2c/0x50 [ 1437.696275] new_inode+0x1c/0x40 [ 1437.699658] shmem_get_inode+0xf1/0x920 [ 1437.703667] ? shmem_encode_fh+0x340/0x340 [ 1437.707935] ? lock_downgrade+0x900/0x900 [ 1437.712095] ? lock_release+0xa00/0xa00 [ 1437.716073] ? arch_local_save_flags+0x40/0x40 [ 1437.720665] ? usercopy_warn+0x110/0x110 [ 1437.724751] __shmem_file_setup.part.47+0x83/0x2a0 [ 1437.729714] shmem_file_setup+0x65/0x90 [ 1437.733720] __x64_sys_memfd_create+0x2af/0x4f0 [ 1437.738404] ? memfd_fcntl+0x1910/0x1910 [ 1437.742482] do_syscall_64+0x1b9/0x820 [ 1437.746417] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1437.751792] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1437.756730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1437.761586] ? trace_hardirqs_on_caller+0x310/0x310 [ 1437.766621] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1437.771654] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1437.776700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1437.781562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.786774] RIP: 0033:0x457759 [ 1437.789972] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.808894] RSP: 002b:00007f58d1a84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1437.816637] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457759 [ 1437.823906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc8f6 [ 1437.831177] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1437.838674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58d1a856d4 02:17:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf7250000}, 0x10) 02:17:38 executing program 4 (fault-call:10 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1437.845962] R13: 00000000004c5bed R14: 00000000004da8f0 R15: 0000000000000005 02:17:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf401, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:38 executing program 5 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x2000000}, 0x10) [ 1437.948587] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1437.960942] FAULT_INJECTION: forcing a failure. [ 1437.960942] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.989507] FAULT_INJECTION: forcing a failure. [ 1437.989507] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.009198] CPU: 1 PID: 603 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1438.016071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.025436] Call Trace: [ 1438.028046] dump_stack+0x1d3/0x2c6 [ 1438.031697] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1438.036908] ? __kernel_text_address+0xd/0x40 [ 1438.041420] ? unwind_get_return_address+0x61/0xa0 [ 1438.046390] should_fail.cold.4+0xa/0x17 [ 1438.050487] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1438.055609] ? save_stack+0xa9/0xd0 [ 1438.059249] ? kasan_kmalloc+0xc7/0xe0 [ 1438.063157] ? kasan_slab_alloc+0x12/0x20 [ 1438.067315] ? kmem_cache_alloc+0x12e/0x730 [ 1438.071643] ? mempool_alloc_slab+0x44/0x60 [ 1438.076083] ? mempool_init_node+0x2d2/0x550 [ 1438.080518] ? mempool_init+0x3d/0x50 [ 1438.084344] ? graph_lock+0x270/0x270 [ 1438.088168] ? loop_add+0x376/0xa40 [ 1438.091807] ? loop_control_ioctl+0x199/0x530 [ 1438.096313] ? do_vfs_ioctl+0x1de/0x1790 [ 1438.100392] ? ksys_ioctl+0xa9/0xd0 [ 1438.104043] ? __x64_sys_ioctl+0x73/0xb0 [ 1438.108130] ? do_syscall_64+0x1b9/0x820 [ 1438.112207] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.117605] ? find_held_lock+0x36/0x1c0 [ 1438.121680] ? __lock_is_held+0xb5/0x140 [ 1438.125789] ? ___might_sleep+0x1ed/0x300 [ 1438.129964] ? arch_local_save_flags+0x40/0x40 [ 1438.134585] __should_failslab+0x124/0x180 [ 1438.138833] should_failslab+0x9/0x14 [ 1438.142642] kmem_cache_alloc+0x2be/0x730 [ 1438.146806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1438.152363] ? __phys_addr+0xa6/0x120 [ 1438.156172] ? mempool_init+0x3d/0x50 [ 1438.159998] ? mempool_free+0x370/0x370 [ 1438.163990] mempool_alloc_slab+0x44/0x60 [ 1438.168152] mempool_init_node+0x2d2/0x550 [ 1438.172405] ? mempool_free+0x370/0x370 [ 1438.176395] ? mempool_alloc_slab+0x60/0x60 [ 1438.180732] mempool_init+0x3d/0x50 [ 1438.184385] bioset_init+0x3d4/0x840 [ 1438.188126] ? bioset_exit+0x370/0x370 [ 1438.192053] blk_alloc_queue_node+0x287/0xe80 [ 1438.196579] ? blk_init_allocated_queue+0x640/0x640 [ 1438.201607] ? __mutex_init+0x1f7/0x290 [ 1438.205628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.211191] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1438.215968] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1438.220650] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1438.225855] blk_mq_init_queue+0x4b/0xb0 [ 1438.229932] loop_add+0x376/0xa40 [ 1438.233397] ? loop_queue_rq+0x690/0x690 [ 1438.237477] loop_control_ioctl+0x199/0x530 [ 1438.241808] ? loop_add+0xa40/0xa40 [ 1438.245450] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1438.250404] ? loop_add+0xa40/0xa40 [ 1438.254043] do_vfs_ioctl+0x1de/0x1790 [ 1438.257941] ? __lock_is_held+0xb5/0x140 [ 1438.262015] ? ioctl_preallocate+0x300/0x300 [ 1438.266452] ? memset+0x31/0x40 [ 1438.269743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.275287] ? smack_file_ioctl+0x210/0x3c0 [ 1438.279629] ? fget_raw+0x20/0x20 [ 1438.283089] ? smack_file_lock+0x2e0/0x2e0 [ 1438.287340] ? fput+0x130/0x1a0 [ 1438.290634] ? do_syscall_64+0x9a/0x820 [ 1438.294630] ? do_syscall_64+0x9a/0x820 [ 1438.298621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.304165] ? security_file_ioctl+0x94/0xc0 [ 1438.308587] ksys_ioctl+0xa9/0xd0 [ 1438.312072] __x64_sys_ioctl+0x73/0xb0 [ 1438.315970] do_syscall_64+0x1b9/0x820 [ 1438.319866] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1438.325252] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1438.330219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1438.335065] ? trace_hardirqs_on_caller+0x310/0x310 [ 1438.340104] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1438.345131] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1438.350152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1438.355023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.360216] RIP: 0033:0x457759 [ 1438.363408] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.382307] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:17:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1438.390015] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1438.397285] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1438.404550] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1438.411828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1438.419094] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1438.432222] CPU: 1 PID: 605 Comm: syz-executor5 Not tainted 4.20.0+ #167 [ 1438.439096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.448468] Call Trace: [ 1438.451065] dump_stack+0x1d3/0x2c6 [ 1438.454740] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1438.459939] ? find_held_lock+0x36/0x1c0 [ 1438.464011] should_fail.cold.4+0xa/0x17 [ 1438.468103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1438.473218] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1438.478149] ? kasan_check_read+0x11/0x20 [ 1438.482324] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1438.487624] ? rcu_softirq_qs+0x20/0x20 [ 1438.491664] ? rcu_softirq_qs+0x20/0x20 [ 1438.495669] ? unwind_dump+0x190/0x190 [ 1438.499591] ? is_bpf_text_address+0xd3/0x170 [ 1438.504111] ? kernel_text_address+0x79/0xf0 [ 1438.508557] ? __kernel_text_address+0xd/0x40 [ 1438.513063] ? unwind_get_return_address+0x61/0xa0 [ 1438.518003] ? __save_stack_trace+0x8d/0xf0 [ 1438.522369] ? ___might_sleep+0x1ed/0x300 [ 1438.526528] ? arch_local_save_flags+0x40/0x40 [ 1438.531125] ? save_stack+0x43/0xd0 [ 1438.534761] ? kasan_kmalloc+0xc7/0xe0 [ 1438.538655] ? kasan_slab_alloc+0x12/0x20 [ 1438.542815] ? kmem_cache_alloc+0x12e/0x730 [ 1438.547153] ? shmem_alloc_inode+0x1b/0x40 [ 1438.551403] __should_failslab+0x124/0x180 [ 1438.555681] should_failslab+0x9/0x14 [ 1438.559494] kmem_cache_alloc+0x2be/0x730 [ 1438.563654] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1438.568684] ? map_id_range_down+0x1ee/0x430 [ 1438.573128] new_inode_smack+0x20/0xb0 [ 1438.577040] smack_inode_alloc_security+0x92/0x100 [ 1438.581979] security_inode_alloc+0x73/0xd0 [ 1438.586316] inode_init_always+0x68f/0xd80 [ 1438.590570] ? get_nr_inodes+0x120/0x120 [ 1438.594639] ? rcu_pm_notify+0xc0/0xc0 [ 1438.598550] ? rcu_read_lock_sched_held+0x108/0x120 [ 1438.603576] ? kmem_cache_alloc+0x33a/0x730 [ 1438.607910] ? shmem_alloc_inode+0x1b/0x40 [ 1438.612171] ? shmem_destroy_callback+0xc0/0xc0 [ 1438.616856] alloc_inode+0x80/0x190 [ 1438.620500] new_inode_pseudo+0x71/0x1a0 [ 1438.624575] ? prune_icache_sb+0x1c0/0x1c0 [ 1438.628858] ? _raw_spin_unlock+0x2c/0x50 [ 1438.633041] new_inode+0x1c/0x40 [ 1438.636419] shmem_get_inode+0xf1/0x920 [ 1438.640413] ? shmem_encode_fh+0x340/0x340 [ 1438.644659] ? lock_downgrade+0x900/0x900 [ 1438.648824] ? lock_release+0xa00/0xa00 [ 1438.652807] ? arch_local_save_flags+0x40/0x40 [ 1438.657403] ? usercopy_warn+0x110/0x110 [ 1438.661483] __shmem_file_setup.part.47+0x83/0x2a0 [ 1438.666447] shmem_file_setup+0x65/0x90 [ 1438.670476] __x64_sys_memfd_create+0x2af/0x4f0 [ 1438.675161] ? memfd_fcntl+0x1910/0x1910 [ 1438.679243] do_syscall_64+0x1b9/0x820 [ 1438.683169] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1438.688546] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1438.693485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1438.698344] ? trace_hardirqs_on_caller+0x310/0x310 [ 1438.703384] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1438.708485] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1438.713515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1438.718420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.723617] RIP: 0033:0x457759 02:17:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xc0fe, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:39 executing program 4 (fault-call:10 fault-nth:15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xf0}, 0x10) [ 1438.726824] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.745733] RSP: 002b:00007f58d1a84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1438.753461] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457759 [ 1438.760761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc8f6 [ 1438.768055] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1438.775327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58d1a856d4 [ 1438.782607] R13: 00000000004c5bed R14: 00000000004da8f0 R15: 0000000000000005 02:17:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xfffffffffffff000}, 0x10) 02:17:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1438.931118] FAULT_INJECTION: forcing a failure. [ 1438.931118] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.968348] CPU: 0 PID: 623 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1438.975253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.984632] Call Trace: [ 1438.987237] dump_stack+0x1d3/0x2c6 [ 1438.990901] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1438.996131] should_fail.cold.4+0xa/0x17 [ 1439.000204] ? __kernel_text_address+0xd/0x40 [ 1439.004713] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1439.009829] ? __save_stack_trace+0x8d/0xf0 [ 1439.014183] ? graph_lock+0x270/0x270 [ 1439.017994] ? save_stack+0xa9/0xd0 [ 1439.021640] ? save_stack+0x43/0xd0 [ 1439.025273] ? kasan_kmalloc+0xc7/0xe0 [ 1439.029224] ? find_held_lock+0x36/0x1c0 [ 1439.033305] ? __lock_is_held+0xb5/0x140 [ 1439.037433] ? ___might_sleep+0x1ed/0x300 [ 1439.041592] ? arch_local_save_flags+0x40/0x40 [ 1439.046192] ? __lock_is_held+0xb5/0x140 [ 1439.050278] __should_failslab+0x124/0x180 [ 1439.054539] should_failslab+0x9/0x14 [ 1439.058365] kmem_cache_alloc+0x2be/0x730 [ 1439.062524] ? kasan_kmalloc+0xc7/0xe0 [ 1439.066427] ? mempool_free+0x370/0x370 [ 1439.070425] mempool_alloc_slab+0x44/0x60 [ 1439.074584] mempool_init_node+0x2d2/0x550 [ 1439.078838] ? mempool_free+0x370/0x370 [ 1439.082823] ? mempool_alloc_slab+0x60/0x60 [ 1439.087158] mempool_init+0x3d/0x50 [ 1439.090800] bioset_init+0x646/0x840 [ 1439.094527] ? bioset_exit+0x370/0x370 [ 1439.098434] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1439.103469] blk_alloc_queue_node+0x287/0xe80 [ 1439.107979] ? blk_init_allocated_queue+0x640/0x640 [ 1439.113030] ? __mutex_init+0x1f7/0x290 [ 1439.117050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.122597] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1439.127382] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1439.132098] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1439.137305] blk_mq_init_queue+0x4b/0xb0 [ 1439.141406] loop_add+0x376/0xa40 [ 1439.144878] ? loop_queue_rq+0x690/0x690 [ 1439.148976] loop_control_ioctl+0x199/0x530 [ 1439.153324] ? loop_add+0xa40/0xa40 [ 1439.156979] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1439.161928] ? loop_add+0xa40/0xa40 [ 1439.165568] do_vfs_ioctl+0x1de/0x1790 [ 1439.169510] ? __lock_is_held+0xb5/0x140 [ 1439.173601] ? ioctl_preallocate+0x300/0x300 [ 1439.178028] ? memset+0x31/0x40 [ 1439.181321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.186898] ? smack_file_ioctl+0x210/0x3c0 [ 1439.191229] ? fget_raw+0x20/0x20 [ 1439.194696] ? smack_file_lock+0x2e0/0x2e0 [ 1439.198949] ? fput+0x130/0x1a0 [ 1439.202239] ? do_syscall_64+0x9a/0x820 [ 1439.206244] ? do_syscall_64+0x9a/0x820 [ 1439.210241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.215800] ? security_file_ioctl+0x94/0xc0 [ 1439.220237] ksys_ioctl+0xa9/0xd0 [ 1439.223723] __x64_sys_ioctl+0x73/0xb0 [ 1439.227630] do_syscall_64+0x1b9/0x820 [ 1439.231545] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1439.236920] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1439.241860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1439.246714] ? trace_hardirqs_on_caller+0x310/0x310 [ 1439.251740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1439.256770] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1439.261829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1439.266689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.271879] RIP: 0033:0x457759 [ 1439.275092] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.294029] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1439.301742] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1439.309041] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1439.316312] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1439.323633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:17:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xe000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1439.330909] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xc}, 0x10) 02:17:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:39 executing program 4 (fault-call:10 fault-nth:16): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfe800000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xffffffeb}, 0x10) [ 1439.562504] FAULT_INJECTION: forcing a failure. [ 1439.562504] name failslab, interval 1, probability 0, space 0, times 0 [ 1439.595392] CPU: 0 PID: 656 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1439.602262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1439.611631] Call Trace: [ 1439.614241] dump_stack+0x1d3/0x2c6 [ 1439.617894] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1439.623139] should_fail.cold.4+0xa/0x17 [ 1439.628255] ? __kernel_text_address+0xd/0x40 [ 1439.632785] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1439.637894] ? __save_stack_trace+0x8d/0xf0 [ 1439.642233] ? graph_lock+0x270/0x270 [ 1439.646038] ? save_stack+0xa9/0xd0 [ 1439.649686] ? save_stack+0x43/0xd0 [ 1439.653310] ? kasan_kmalloc+0xc7/0xe0 [ 1439.657206] ? find_held_lock+0x36/0x1c0 [ 1439.661275] ? __lock_is_held+0xb5/0x140 [ 1439.665348] ? ___might_sleep+0x1ed/0x300 [ 1439.669510] ? arch_local_save_flags+0x40/0x40 [ 1439.674108] ? __lock_is_held+0xb5/0x140 [ 1439.678187] __should_failslab+0x124/0x180 [ 1439.682427] should_failslab+0x9/0x14 [ 1439.686234] kmem_cache_alloc+0x2be/0x730 [ 1439.690402] ? kasan_kmalloc+0xc7/0xe0 [ 1439.694297] ? mempool_free+0x370/0x370 [ 1439.698271] mempool_alloc_slab+0x44/0x60 [ 1439.702431] mempool_init_node+0x2d2/0x550 [ 1439.706699] ? mempool_free+0x370/0x370 [ 1439.710688] ? mempool_alloc_slab+0x60/0x60 [ 1439.715009] mempool_init+0x3d/0x50 [ 1439.718677] bioset_init+0x646/0x840 [ 1439.722398] ? bioset_exit+0x370/0x370 [ 1439.726300] blk_alloc_queue_node+0x287/0xe80 [ 1439.730800] ? blk_init_allocated_queue+0x640/0x640 [ 1439.735820] ? __mutex_init+0x1f7/0x290 [ 1439.739819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.745364] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1439.750223] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1439.754894] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1439.760088] blk_mq_init_queue+0x4b/0xb0 [ 1439.764155] loop_add+0x376/0xa40 [ 1439.767635] ? loop_queue_rq+0x690/0x690 [ 1439.771707] loop_control_ioctl+0x199/0x530 [ 1439.776032] ? loop_add+0xa40/0xa40 [ 1439.779667] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1439.784599] ? loop_add+0xa40/0xa40 [ 1439.788230] do_vfs_ioctl+0x1de/0x1790 [ 1439.792116] ? __lock_is_held+0xb5/0x140 [ 1439.796201] ? ioctl_preallocate+0x300/0x300 [ 1439.800609] ? memset+0x31/0x40 [ 1439.803900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.809473] ? smack_file_ioctl+0x210/0x3c0 [ 1439.813806] ? fget_raw+0x20/0x20 [ 1439.817274] ? smack_file_lock+0x2e0/0x2e0 [ 1439.821513] ? fput+0x130/0x1a0 [ 1439.824793] ? do_syscall_64+0x9a/0x820 [ 1439.828780] ? do_syscall_64+0x9a/0x820 [ 1439.832944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.838482] ? security_file_ioctl+0x94/0xc0 [ 1439.842893] ksys_ioctl+0xa9/0xd0 [ 1439.846373] __x64_sys_ioctl+0x73/0xb0 [ 1439.850264] do_syscall_64+0x1b9/0x820 [ 1439.854151] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1439.859511] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1439.864450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1439.869290] ? trace_hardirqs_on_caller+0x310/0x310 [ 1439.874335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1439.879370] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1439.884390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1439.889240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.894432] RIP: 0033:0x457759 02:17:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1439.897630] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.916532] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1439.924243] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1439.931512] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1439.938797] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1439.946065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1439.953333] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x7ffffffff000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0xc00}, 0x10) 02:17:40 executing program 4 (fault-call:10 fault-nth:17): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1200}, 0x10) 02:17:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x5400, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf725000000000000}, 0x10) 02:17:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1440.270321] FAULT_INJECTION: forcing a failure. [ 1440.270321] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.306817] CPU: 0 PID: 690 Comm: syz-executor4 Not tainted 4.20.0+ #167 02:17:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x2, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xfffff000}, 0x10) [ 1440.313688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.323060] Call Trace: [ 1440.325662] dump_stack+0x1d3/0x2c6 [ 1440.329300] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1440.334498] ? __kernel_text_address+0xd/0x40 [ 1440.339001] ? unwind_get_return_address+0x61/0xa0 [ 1440.343960] should_fail.cold.4+0xa/0x17 [ 1440.348088] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1440.353201] ? save_stack+0xa9/0xd0 [ 1440.356831] ? kasan_kmalloc+0xc7/0xe0 [ 1440.360725] ? kasan_slab_alloc+0x12/0x20 [ 1440.364882] ? kmem_cache_alloc+0x12e/0x730 [ 1440.369206] ? mempool_alloc_slab+0x44/0x60 [ 1440.373525] ? mempool_init_node+0x2d2/0x550 [ 1440.377934] ? mempool_init+0x3d/0x50 [ 1440.381737] ? graph_lock+0x270/0x270 [ 1440.385556] ? loop_add+0x376/0xa40 [ 1440.389187] ? loop_control_ioctl+0x199/0x530 [ 1440.393684] ? do_vfs_ioctl+0x1de/0x1790 [ 1440.397746] ? ksys_ioctl+0xa9/0xd0 [ 1440.401385] ? __x64_sys_ioctl+0x73/0xb0 [ 1440.405453] ? do_syscall_64+0x1b9/0x820 [ 1440.409542] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1440.414915] ? find_held_lock+0x36/0x1c0 [ 1440.418993] ? __lock_is_held+0xb5/0x140 [ 1440.423068] ? ___might_sleep+0x1ed/0x300 [ 1440.427220] ? arch_local_save_flags+0x40/0x40 [ 1440.431819] __should_failslab+0x124/0x180 [ 1440.436061] should_failslab+0x9/0x14 [ 1440.439868] kmem_cache_alloc+0x2be/0x730 [ 1440.444028] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1440.449598] ? __phys_addr+0xa6/0x120 [ 1440.453450] ? mempool_init+0x3d/0x50 [ 1440.457277] ? mempool_free+0x370/0x370 [ 1440.461273] mempool_alloc_slab+0x44/0x60 [ 1440.465427] mempool_init_node+0x2d2/0x550 [ 1440.469675] ? mempool_free+0x370/0x370 [ 1440.473667] ? mempool_alloc_slab+0x60/0x60 [ 1440.478036] mempool_init+0x3d/0x50 [ 1440.481698] bioset_init+0x646/0x840 [ 1440.485449] ? bioset_exit+0x370/0x370 [ 1440.489362] blk_alloc_queue_node+0x287/0xe80 [ 1440.493889] ? blk_init_allocated_queue+0x640/0x640 [ 1440.498913] ? __mutex_init+0x1f7/0x290 [ 1440.502916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1440.508472] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1440.513273] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1440.517958] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1440.523159] blk_mq_init_queue+0x4b/0xb0 [ 1440.527264] loop_add+0x376/0xa40 [ 1440.530763] ? loop_queue_rq+0x690/0x690 [ 1440.534873] loop_control_ioctl+0x199/0x530 [ 1440.539218] ? loop_add+0xa40/0xa40 [ 1440.542859] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1440.547801] ? loop_add+0xa40/0xa40 [ 1440.551438] do_vfs_ioctl+0x1de/0x1790 [ 1440.555379] ? __lock_is_held+0xb5/0x140 [ 1440.559457] ? ioctl_preallocate+0x300/0x300 [ 1440.563893] ? memset+0x31/0x40 [ 1440.567199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1440.572743] ? smack_file_ioctl+0x210/0x3c0 [ 1440.577071] ? fget_raw+0x20/0x20 [ 1440.580536] ? smack_file_lock+0x2e0/0x2e0 [ 1440.584787] ? fput+0x130/0x1a0 [ 1440.588073] ? do_syscall_64+0x9a/0x820 [ 1440.592071] ? do_syscall_64+0x9a/0x820 [ 1440.596072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1440.601636] ? security_file_ioctl+0x94/0xc0 [ 1440.606055] ksys_ioctl+0xa9/0xd0 [ 1440.609520] __x64_sys_ioctl+0x73/0xb0 [ 1440.613430] do_syscall_64+0x1b9/0x820 [ 1440.617396] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1440.622770] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1440.627718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1440.632599] ? trace_hardirqs_on_caller+0x310/0x310 [ 1440.637651] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1440.642709] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1440.647738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1440.652613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1440.657831] RIP: 0033:0x457759 [ 1440.661081] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1440.679986] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1440.687696] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1440.694987] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1440.702256] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1440.709525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:17:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1440.716794] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:41 executing program 4 (fault-call:10 fault-nth:18): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf1df577400000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x2000000}, 0x10) 02:17:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x5400, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x7ffffffff000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1440.916640] FAULT_INJECTION: forcing a failure. [ 1440.916640] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.950244] CPU: 0 PID: 717 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1440.957110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 02:17:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) [ 1440.966640] Call Trace: [ 1440.969267] dump_stack+0x1d3/0x2c6 [ 1440.972919] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1440.978129] ? do_vfs_ioctl+0x1de/0x1790 [ 1440.982204] ? ksys_ioctl+0xa9/0xd0 [ 1440.985842] ? __x64_sys_ioctl+0x73/0xb0 [ 1440.989915] ? do_syscall_64+0x1b9/0x820 [ 1440.993994] should_fail.cold.4+0xa/0x17 [ 1440.998086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1441.003207] ? graph_lock+0x270/0x270 [ 1441.007030] ? check_preemption_disabled+0x48/0x280 [ 1441.012069] ? graph_lock+0x270/0x270 02:17:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x6000000}, 0x10) [ 1441.015885] ? __lock_is_held+0xb5/0x140 [ 1441.019962] ? find_held_lock+0x36/0x1c0 [ 1441.024034] ? __lock_is_held+0xb5/0x140 [ 1441.028135] ? ___might_sleep+0x1ed/0x300 [ 1441.032291] ? arch_local_save_flags+0x40/0x40 [ 1441.036907] __should_failslab+0x124/0x180 [ 1441.041152] should_failslab+0x9/0x14 [ 1441.044965] kmem_cache_alloc_node_trace+0x270/0x740 [ 1441.050085] ? bioset_exit+0x370/0x370 [ 1441.053991] bdi_alloc_node+0x89/0xe0 [ 1441.057826] blk_alloc_queue_node+0x2b7/0xe80 [ 1441.062367] ? blk_init_allocated_queue+0x640/0x640 02:17:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x12000000}, 0x10) [ 1441.067402] ? __mutex_init+0x1f7/0x290 [ 1441.071422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.076970] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1441.081745] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1441.086430] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1441.091654] blk_mq_init_queue+0x4b/0xb0 [ 1441.095734] loop_add+0x376/0xa40 [ 1441.099202] ? loop_queue_rq+0x690/0x690 [ 1441.103288] loop_control_ioctl+0x199/0x530 [ 1441.107635] ? loop_add+0xa40/0xa40 [ 1441.111285] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1441.116235] ? loop_add+0xa40/0xa40 [ 1441.119877] do_vfs_ioctl+0x1de/0x1790 [ 1441.123785] ? __lock_is_held+0xb5/0x140 [ 1441.127859] ? ioctl_preallocate+0x300/0x300 [ 1441.132280] ? memset+0x31/0x40 [ 1441.135577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.141148] ? smack_file_ioctl+0x210/0x3c0 [ 1441.145481] ? fget_raw+0x20/0x20 [ 1441.148951] ? smack_file_lock+0x2e0/0x2e0 [ 1441.153220] ? fput+0x130/0x1a0 [ 1441.156514] ? do_syscall_64+0x9a/0x820 [ 1441.160514] ? do_syscall_64+0x9a/0x820 02:17:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf000}, 0x10) [ 1441.164523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.170066] ? security_file_ioctl+0x94/0xc0 [ 1441.174488] ksys_ioctl+0xa9/0xd0 [ 1441.177998] __x64_sys_ioctl+0x73/0xb0 [ 1441.181904] do_syscall_64+0x1b9/0x820 [ 1441.185808] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1441.191185] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1441.196123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1441.200993] ? trace_hardirqs_on_caller+0x310/0x310 [ 1441.206023] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1441.211063] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1441.216096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1441.220999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.226199] RIP: 0033:0x457759 [ 1441.229403] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1441.248319] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1441.256041] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1441.263317] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1441.270596] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1441.277870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1441.285143] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:41 executing program 4 (fault-call:10 fault-nth:19): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf0}, 0x10) 02:17:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x700000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1441.403524] FAULT_INJECTION: forcing a failure. [ 1441.403524] name failslab, interval 1, probability 0, space 0, times 0 [ 1441.451865] CPU: 1 PID: 747 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1441.458750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.468127] Call Trace: [ 1441.470726] dump_stack+0x1d3/0x2c6 [ 1441.474383] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1441.479591] ? mark_held_locks+0xc7/0x130 [ 1441.483768] should_fail.cold.4+0xa/0x17 [ 1441.487852] ? trace_hardirqs_on+0xbd/0x310 [ 1441.492188] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1441.497312] ? do_raw_spin_trylock+0x270/0x270 [ 1441.501913] ? mark_held_locks+0xc7/0x130 [ 1441.506078] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1441.511212] ? graph_lock+0x270/0x270 [ 1441.515023] ? __debug_object_init+0x57d/0x1290 [ 1441.519702] ? trace_hardirqs_on+0xbd/0x310 [ 1441.524031] ? kasan_check_read+0x11/0x20 [ 1441.528186] ? graph_lock+0x270/0x270 [ 1441.532001] ? find_held_lock+0x36/0x1c0 [ 1441.536077] ? __lock_is_held+0xb5/0x140 [ 1441.540178] ? ___might_sleep+0x1ed/0x300 [ 1441.544334] ? arch_local_save_flags+0x40/0x40 [ 1441.548943] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1441.554065] __should_failslab+0x124/0x180 [ 1441.558317] should_failslab+0x9/0x14 [ 1441.562156] kmem_cache_alloc_trace+0x2d7/0x750 [ 1441.566838] ? __lockdep_init_map+0x105/0x590 [ 1441.571367] wb_congested_get_create+0x20a/0x4a0 [ 1441.576145] ? wb_wakeup_delayed+0xf0/0xf0 [ 1441.580402] ? __lockdep_init_map+0x105/0x590 [ 1441.584936] wb_init+0x636/0x9e0 [ 1441.588316] ? bdi_put+0x180/0x180 [ 1441.591879] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1441.597163] ? __lockdep_init_map+0x105/0x590 [ 1441.601681] ? loop_add+0x376/0xa40 [ 1441.605335] ? lockdep_init_map+0x9/0x10 [ 1441.609415] ? debug_mutex_init+0x2d/0x60 [ 1441.613581] ? psi_task_change.cold.11+0x1ac/0x1ac [ 1441.618538] ? __lockdep_init_map+0x105/0x590 [ 1441.623061] ? __init_waitqueue_head+0x9e/0x150 [ 1441.627785] ? __lockdep_init_map+0x105/0x590 [ 1441.632321] ? lockdep_init_map+0x9/0x10 [ 1441.636414] ? __raw_spin_lock_init+0x2d/0x100 [ 1441.641010] bdi_init+0x30d/0x4d0 [ 1441.644478] ? wb_init+0x9e0/0x9e0 [ 1441.648026] ? bdi_alloc_node+0x89/0xe0 [ 1441.652021] ? bdi_alloc_node+0x89/0xe0 [ 1441.656004] ? rcu_read_lock_sched_held+0x108/0x120 [ 1441.661032] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1441.666316] ? bioset_exit+0x370/0x370 [ 1441.670217] bdi_alloc_node+0x9e/0xe0 [ 1441.674028] blk_alloc_queue_node+0x2b7/0xe80 [ 1441.678538] ? blk_init_allocated_queue+0x640/0x640 [ 1441.683569] ? __mutex_init+0x1f7/0x290 [ 1441.687580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.693138] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1441.697924] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1441.702628] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1441.707831] blk_mq_init_queue+0x4b/0xb0 [ 1441.711914] loop_add+0x376/0xa40 [ 1441.715438] ? loop_queue_rq+0x690/0x690 [ 1441.719579] loop_control_ioctl+0x199/0x530 [ 1441.723924] ? loop_add+0xa40/0xa40 [ 1441.727586] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1441.732534] ? loop_add+0xa40/0xa40 [ 1441.736172] do_vfs_ioctl+0x1de/0x1790 [ 1441.740071] ? __lock_is_held+0xb5/0x140 [ 1441.744160] ? ioctl_preallocate+0x300/0x300 [ 1441.748572] ? memset+0x31/0x40 [ 1441.751863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.757410] ? smack_file_ioctl+0x210/0x3c0 [ 1441.761738] ? fget_raw+0x20/0x20 [ 1441.765196] ? smack_file_lock+0x2e0/0x2e0 [ 1441.769445] ? fput+0x130/0x1a0 [ 1441.772734] ? do_syscall_64+0x9a/0x820 [ 1441.776718] ? do_syscall_64+0x9a/0x820 [ 1441.780707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1441.786249] ? security_file_ioctl+0x94/0xc0 [ 1441.790685] ksys_ioctl+0xa9/0xd0 [ 1441.794155] __x64_sys_ioctl+0x73/0xb0 [ 1441.798055] do_syscall_64+0x1b9/0x820 [ 1441.801960] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1441.807365] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1441.812311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1441.817168] ? trace_hardirqs_on_caller+0x310/0x310 [ 1441.822201] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1441.827237] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1441.832361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1441.837228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.842472] RIP: 0033:0x457759 [ 1441.845673] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1441.864576] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1441.872300] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1441.879586] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1441.886935] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1441.894233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:17:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xff00000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf1df577400000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x2}, 0x10) [ 1441.901503] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000}, 0x10) 02:17:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:42 executing program 4 (fault-call:10 fault-nth:20): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfe800000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x40020000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1442.120953] FAULT_INJECTION: forcing a failure. [ 1442.120953] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.168075] CPU: 1 PID: 770 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1442.174955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.184313] Call Trace: [ 1442.186924] dump_stack+0x1d3/0x2c6 [ 1442.190575] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1442.195781] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1442.200916] should_fail.cold.4+0xa/0x17 [ 1442.205038] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1442.210151] ? lockdep_init_map+0x9/0x10 [ 1442.214231] ? __raw_spin_lock_init+0x2d/0x100 [ 1442.218823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.224365] ? wb_init+0x6f2/0x9e0 [ 1442.227909] ? graph_lock+0x270/0x270 [ 1442.231717] ? bdi_put+0x180/0x180 [ 1442.235258] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1442.240539] ? find_held_lock+0x36/0x1c0 [ 1442.244607] ? __lock_is_held+0xb5/0x140 [ 1442.248683] ? ___might_sleep+0x1ed/0x300 [ 1442.252832] ? __init_waitqueue_head+0x9e/0x150 [ 1442.257501] ? arch_local_save_flags+0x40/0x40 [ 1442.262107] ? __raw_spin_lock_init+0x2d/0x100 [ 1442.266702] __should_failslab+0x124/0x180 [ 1442.270938] should_failslab+0x9/0x14 [ 1442.274739] kmem_cache_alloc_trace+0x2d7/0x750 [ 1442.279424] ? bdi_alloc_node+0x89/0xe0 [ 1442.283394] ? bdi_alloc_node+0x89/0xe0 [ 1442.287377] ? rcu_read_lock_sched_held+0x108/0x120 [ 1442.292427] blk_alloc_queue_stats+0x90/0x1c0 [ 1442.296951] ? blk_stat_add+0x650/0x650 [ 1442.300932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.306506] blk_alloc_queue_node+0x2fa/0xe80 [ 1442.311005] ? blk_init_allocated_queue+0x640/0x640 [ 1442.316024] ? __mutex_init+0x1f7/0x290 [ 1442.320021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.325555] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1442.330328] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1442.335004] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1442.340196] blk_mq_init_queue+0x4b/0xb0 [ 1442.344256] loop_add+0x376/0xa40 [ 1442.347754] ? loop_queue_rq+0x690/0x690 [ 1442.351848] loop_control_ioctl+0x199/0x530 [ 1442.356174] ? loop_add+0xa40/0xa40 [ 1442.359827] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1442.364760] ? loop_add+0xa40/0xa40 [ 1442.368419] do_vfs_ioctl+0x1de/0x1790 [ 1442.372309] ? __lock_is_held+0xb5/0x140 [ 1442.376380] ? ioctl_preallocate+0x300/0x300 [ 1442.380788] ? memset+0x31/0x40 [ 1442.384072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.389613] ? smack_file_ioctl+0x210/0x3c0 [ 1442.393932] ? fget_raw+0x20/0x20 [ 1442.397397] ? smack_file_lock+0x2e0/0x2e0 [ 1442.401691] ? fput+0x130/0x1a0 [ 1442.405004] ? do_syscall_64+0x9a/0x820 [ 1442.408978] ? do_syscall_64+0x9a/0x820 [ 1442.412960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.418497] ? security_file_ioctl+0x94/0xc0 [ 1442.422930] ksys_ioctl+0xa9/0xd0 [ 1442.426402] __x64_sys_ioctl+0x73/0xb0 [ 1442.430329] do_syscall_64+0x1b9/0x820 [ 1442.434248] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1442.439620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1442.444553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1442.449418] ? trace_hardirqs_on_caller+0x310/0x310 [ 1442.454441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1442.459482] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1442.464506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1442.469372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.474565] RIP: 0033:0x457759 [ 1442.477786] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.496690] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1442.504400] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1442.511688] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 02:17:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xc0fe, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x3f00000000000000}, 0x10) [ 1442.518958] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1442.526233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1442.533501] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xebffffff}, 0x10) 02:17:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:42 executing program 4 (fault-call:10 fault-nth:21): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:42 executing program 2 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x500, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x1000000}, 0x10) 02:17:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xfe', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1442.819507] FAULT_INJECTION: forcing a failure. [ 1442.819507] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.868665] CPU: 1 PID: 804 Comm: syz-executor2 Not tainted 4.20.0+ #167 [ 1442.875597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.884970] Call Trace: [ 1442.887601] dump_stack+0x1d3/0x2c6 [ 1442.891245] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1442.896460] ? lock_downgrade+0x900/0x900 [ 1442.900634] should_fail.cold.4+0xa/0x17 [ 1442.904708] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1442.909828] ? lock_downgrade+0x900/0x900 [ 1442.914020] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1442.919566] ? proc_fail_nth_write+0x9e/0x210 [ 1442.924071] ? proc_cwd_link+0x1d0/0x1d0 [ 1442.928171] ? find_held_lock+0x36/0x1c0 [ 1442.932258] ? ___might_sleep+0x1ed/0x300 [ 1442.936439] ? arch_local_save_flags+0x40/0x40 [ 1442.941067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1442.946639] __should_failslab+0x124/0x180 [ 1442.950888] should_failslab+0x9/0x14 [ 1442.954702] __kmalloc+0x2e0/0x770 [ 1442.958250] ? strncpy_from_user+0x510/0x510 [ 1442.962663] ? fput+0x130/0x1a0 [ 1442.966464] ? do_syscall_64+0x9a/0x820 [ 1442.970450] ? __x64_sys_memfd_create+0x142/0x4f0 [ 1442.975296] ? do_syscall_64+0x9a/0x820 [ 1442.979295] __x64_sys_memfd_create+0x142/0x4f0 [ 1442.983976] ? memfd_fcntl+0x1910/0x1910 [ 1442.988067] do_syscall_64+0x1b9/0x820 [ 1442.991981] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1442.997351] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1443.002331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1443.007217] ? trace_hardirqs_on_caller+0x310/0x310 [ 1443.012243] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1443.017275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1443.022309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1443.027171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.032407] RIP: 0033:0x457759 [ 1443.035625] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1443.054566] RSP: 002b:00007f9222430a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1443.062282] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457759 02:17:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x3, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$OBJ_GET_PROG(0x12, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1443.069569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc8f6 [ 1443.076878] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1443.084151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92224316d4 [ 1443.091441] R13: 00000000004c5bed R14: 00000000004da8f0 R15: 0000000000000005 02:17:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000}, 0x10) 02:17:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) [ 1443.220605] FAULT_INJECTION: forcing a failure. [ 1443.220605] name failslab, interval 1, probability 0, space 0, times 0 [ 1443.281859] CPU: 1 PID: 826 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1443.288786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.298149] Call Trace: [ 1443.300754] dump_stack+0x1d3/0x2c6 [ 1443.304401] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1443.309607] ? print_usage_bug+0xc0/0xc0 [ 1443.313690] should_fail.cold.4+0xa/0x17 [ 1443.317768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1443.322885] ? kasan_check_write+0x14/0x20 [ 1443.327137] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1443.332081] ? wait_for_completion+0x8a0/0x8a0 [ 1443.336685] ? graph_lock+0x270/0x270 [ 1443.340497] ? check_preemption_disabled+0x48/0x280 [ 1443.345535] ? find_held_lock+0x36/0x1c0 [ 1443.349616] ? __lock_is_held+0xb5/0x140 [ 1443.353730] ? ___might_sleep+0x1ed/0x300 [ 1443.357909] ? arch_local_save_flags+0x40/0x40 [ 1443.362509] ? pcpu_balance_workfn+0x1700/0x1700 [ 1443.367284] __should_failslab+0x124/0x180 [ 1443.371562] should_failslab+0x9/0x14 [ 1443.375386] kmem_cache_alloc_node_trace+0x270/0x740 [ 1443.380504] ? debug_object_free+0x690/0x690 [ 1443.384939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1443.390503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1443.396073] blkg_alloc+0x124/0x800 [ 1443.399713] ? blkcg_reset_stats+0x3e0/0x3e0 [ 1443.404133] ? lockdep_init_map+0x9/0x10 [ 1443.408217] ? debug_mutex_init+0x2d/0x60 [ 1443.412387] ? __mutex_init+0x1f7/0x290 [ 1443.416399] ? __lockdep_init_map+0x105/0x590 [ 1443.420925] ? kasan_check_write+0x14/0x20 [ 1443.425197] ? percpu_ref_init+0x1fd/0x290 [ 1443.429471] ? blk_set_pm_only+0x30/0x30 [ 1443.433549] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 1443.438964] blkcg_init_queue+0x27/0x560 [ 1443.443057] blk_alloc_queue_node+0x972/0xe80 [ 1443.447570] ? blk_init_allocated_queue+0x640/0x640 [ 1443.452598] ? __mutex_init+0x1f7/0x290 [ 1443.456623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1443.462179] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1443.466957] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1443.472161] blk_mq_init_queue+0x4b/0xb0 [ 1443.476239] loop_add+0x376/0xa40 [ 1443.479704] ? loop_queue_rq+0x690/0x690 [ 1443.483801] loop_control_ioctl+0x199/0x530 [ 1443.488137] ? loop_add+0xa40/0xa40 [ 1443.491780] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1443.496771] ? loop_add+0xa40/0xa40 [ 1443.500411] do_vfs_ioctl+0x1de/0x1790 [ 1443.504313] ? __lock_is_held+0xb5/0x140 [ 1443.508414] ? ioctl_preallocate+0x300/0x300 [ 1443.512871] ? memset+0x31/0x40 [ 1443.516167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1443.521746] ? smack_file_ioctl+0x210/0x3c0 [ 1443.526082] ? fget_raw+0x20/0x20 [ 1443.529564] ? smack_file_lock+0x2e0/0x2e0 [ 1443.533821] ? fput+0x130/0x1a0 [ 1443.537122] ? do_syscall_64+0x9a/0x820 [ 1443.541108] ? do_syscall_64+0x9a/0x820 [ 1443.545102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1443.550671] ? security_file_ioctl+0x94/0xc0 [ 1443.555097] ksys_ioctl+0xa9/0xd0 [ 1443.558592] __x64_sys_ioctl+0x73/0xb0 [ 1443.562495] do_syscall_64+0x1b9/0x820 [ 1443.566396] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1443.571775] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1443.576714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1443.581576] ? trace_hardirqs_on_caller+0x310/0x310 [ 1443.586608] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1443.591641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1443.596690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1443.601549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.606767] RIP: 0033:0x457759 [ 1443.609971] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1443.628921] RSP: 002b:00007f2c5746fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1443.636647] RAX: ffffffffffffffda RBX: 00007f2c5746fc90 RCX: 0000000000457759 [ 1443.643926] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1443.651201] RBP: 000000000073c180 R08: 0000000000000000 R09: 0000000000000000 [ 1443.658475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574706d4 [ 1443.665752] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000004 02:17:44 executing program 4 (fault-call:10 fault-nth:22): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfc00, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x6}, 0x10) 02:17:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:44 executing program 1 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) 02:17:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000}, 0x10) 02:17:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1443.810934] FAULT_INJECTION: forcing a failure. [ 1443.810934] name failslab, interval 1, probability 0, space 0, times 0 [ 1443.866088] CPU: 0 PID: 850 Comm: syz-executor1 Not tainted 4.20.0+ #167 [ 1443.873001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.873009] Call Trace: [ 1443.873035] dump_stack+0x1d3/0x2c6 [ 1443.873064] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1443.883132] FAULT_INJECTION: forcing a failure. [ 1443.883132] name failslab, interval 1, probability 0, space 0, times 0 [ 1443.884991] ? graph_lock+0x270/0x270 [ 1443.885016] should_fail.cold.4+0xa/0x17 [ 1443.885035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1443.885055] ? __lock_acquire+0x62f/0x4c20 [ 1443.908826] ? find_held_lock+0x36/0x1c0 [ 1443.926333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1443.931908] ? graph_lock+0x270/0x270 [ 1443.935732] ? mark_held_locks+0x130/0x130 [ 1443.940015] ? find_held_lock+0x36/0x1c0 [ 1443.944116] ? ___might_sleep+0x1ed/0x300 [ 1443.948270] ? arch_local_save_flags+0x40/0x40 [ 1443.952876] ? find_held_lock+0x36/0x1c0 [ 1443.956961] __should_failslab+0x124/0x180 [ 1443.961204] should_failslab+0x9/0x14 [ 1443.965021] kmem_cache_alloc_trace+0x2d7/0x750 [ 1443.969728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1443.975276] ? proc_fail_nth_write+0x9e/0x210 [ 1443.979787] ? proc_cwd_link+0x1d0/0x1d0 [ 1443.983929] btf_new_fd+0x22a/0x3820 [ 1443.987657] ? find_held_lock+0x36/0x1c0 [ 1443.991778] ? btf_type_seq_show+0x1c0/0x1c0 [ 1443.996220] ? lock_release+0xa00/0xa00 [ 1444.000206] ? arch_local_save_flags+0x40/0x40 [ 1444.004807] ? __lock_is_held+0xb5/0x140 [ 1444.008896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.014449] ? cap_capable+0x1f9/0x260 [ 1444.018370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.023918] ? security_capable+0x99/0xc0 [ 1444.028095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.033677] ? ns_capable_common+0x13f/0x170 [ 1444.038129] bpf_btf_load+0x55/0x70 [ 1444.041766] __x64_sys_bpf+0x4ad/0x520 [ 1444.045666] ? bpf_prog_get+0x20/0x20 [ 1444.049498] do_syscall_64+0x1b9/0x820 [ 1444.053407] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1444.058787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1444.063723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1444.068638] ? trace_hardirqs_on_caller+0x310/0x310 [ 1444.073670] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1444.078700] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1444.083736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1444.088612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.093816] RIP: 0033:0x457759 [ 1444.097020] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.115926] RSP: 002b:00007f3f499afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1444.123649] RAX: ffffffffffffffda RBX: 00007f3f499afc90 RCX: 0000000000457759 [ 1444.130923] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000012 [ 1444.138222] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1444.145528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f499b06d4 [ 1444.152815] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 [ 1444.163741] CPU: 1 PID: 853 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1444.170604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.179963] Call Trace: [ 1444.182574] dump_stack+0x1d3/0x2c6 [ 1444.186231] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1444.191438] ? blkg_create+0x94b/0x16d0 [ 1444.195425] should_fail.cold.4+0xa/0x17 [ 1444.199495] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1444.199512] ? do_raw_spin_unlock+0xa7/0x330 [ 1444.199528] ? do_raw_spin_trylock+0x270/0x270 02:17:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x480, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1444.199547] ? wb_wakeup_delayed+0xf0/0xf0 [ 1444.199570] ? graph_lock+0x270/0x270 [ 1444.209068] ? _raw_spin_unlock+0x2c/0x50 [ 1444.209086] ? blkg_create+0x950/0x16d0 [ 1444.209110] ? find_held_lock+0x36/0x1c0 [ 1444.209140] ? __lock_is_held+0xb5/0x140 [ 1444.209182] ? ___might_sleep+0x1ed/0x300 [ 1444.209199] ? arch_local_save_flags+0x40/0x40 [ 1444.246773] __should_failslab+0x124/0x180 [ 1444.251027] should_failslab+0x9/0x14 [ 1444.254840] kmem_cache_alloc_trace+0x2d7/0x750 [ 1444.259555] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1444.264523] ? kasan_check_read+0x11/0x20 [ 1444.268682] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1444.273973] ? rcu_softirq_qs+0x20/0x20 [ 1444.277982] blk_iolatency_init+0x51/0x2e0 [ 1444.282236] blkcg_init_queue+0x1e3/0x560 [ 1444.286408] blk_alloc_queue_node+0x972/0xe80 [ 1444.290920] ? blk_init_allocated_queue+0x640/0x640 [ 1444.295965] ? __mutex_init+0x1f7/0x290 [ 1444.299994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.305544] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1444.310328] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1444.315554] blk_mq_init_queue+0x4b/0xb0 [ 1444.319629] loop_add+0x376/0xa40 [ 1444.323156] ? loop_queue_rq+0x690/0x690 [ 1444.327245] loop_control_ioctl+0x199/0x530 [ 1444.331575] ? loop_add+0xa40/0xa40 [ 1444.335217] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1444.340183] ? loop_add+0xa40/0xa40 [ 1444.343842] do_vfs_ioctl+0x1de/0x1790 [ 1444.347761] ? __lock_is_held+0xb5/0x140 [ 1444.351840] ? ioctl_preallocate+0x300/0x300 [ 1444.356258] ? memset+0x31/0x40 [ 1444.359568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.365144] ? smack_file_ioctl+0x210/0x3c0 [ 1444.369475] ? fget_raw+0x20/0x20 [ 1444.372942] ? smack_file_lock+0x2e0/0x2e0 [ 1444.377228] ? fput+0x130/0x1a0 [ 1444.380525] ? do_syscall_64+0x9a/0x820 [ 1444.384517] ? do_syscall_64+0x9a/0x820 [ 1444.388530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.394091] ? security_file_ioctl+0x94/0xc0 [ 1444.398519] ksys_ioctl+0xa9/0xd0 [ 1444.401995] __x64_sys_ioctl+0x73/0xb0 [ 1444.405893] do_syscall_64+0x1b9/0x820 [ 1444.409804] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1444.415184] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1444.420129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1444.424987] ? trace_hardirqs_on_caller+0x310/0x310 [ 1444.430012] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1444.435056] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1444.440087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1444.444972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.450198] RIP: 0033:0x457759 [ 1444.453401] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.472327] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1444.480061] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1444.487336] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1444.494616] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1444.501892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1444.509170] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:44 executing program 1 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) 02:17:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf7250000}, 0x10) 02:17:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:44 executing program 4 (fault-call:10 fault-nth:23): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1444.626121] FAULT_INJECTION: forcing a failure. [ 1444.626121] name failslab, interval 1, probability 0, space 0, times 0 [ 1444.655348] CPU: 1 PID: 865 Comm: syz-executor1 Not tainted 4.20.0+ #167 [ 1444.662283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.671642] Call Trace: [ 1444.674266] dump_stack+0x1d3/0x2c6 [ 1444.677917] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1444.683147] ? __kernel_text_address+0xd/0x40 [ 1444.687669] ? unwind_get_return_address+0x61/0xa0 [ 1444.692617] should_fail.cold.4+0xa/0x17 [ 1444.696699] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1444.701823] ? save_stack+0x43/0xd0 [ 1444.705459] ? kasan_kmalloc+0xc7/0xe0 [ 1444.709386] ? kmem_cache_alloc_trace+0x152/0x750 [ 1444.714242] ? btf_new_fd+0x22a/0x3820 [ 1444.718143] ? bpf_btf_load+0x55/0x70 [ 1444.721956] ? __x64_sys_bpf+0x4ad/0x520 [ 1444.726032] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.731412] ? mark_held_locks+0x130/0x130 [ 1444.735678] ? find_held_lock+0x36/0x1c0 [ 1444.739775] ? ___might_sleep+0x1ed/0x300 [ 1444.743937] ? arch_local_save_flags+0x40/0x40 [ 1444.748544] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1444.754126] __should_failslab+0x124/0x180 [ 1444.758385] should_failslab+0x9/0x14 [ 1444.762198] kmem_cache_alloc_trace+0x2d7/0x750 [ 1444.766941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1444.772487] ? proc_fail_nth_write+0x9e/0x210 [ 1444.777007] ? proc_cwd_link+0x1d0/0x1d0 [ 1444.781081] btf_new_fd+0x371/0x3820 [ 1444.781101] ? find_held_lock+0x36/0x1c0 [ 1444.781136] ? btf_type_seq_show+0x1c0/0x1c0 [ 1444.781155] ? lock_release+0xa00/0xa00 [ 1444.788931] ? arch_local_save_flags+0x40/0x40 [ 1444.788945] ? __lock_is_held+0xb5/0x140 [ 1444.788963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.788983] ? cap_capable+0x1f9/0x260 [ 1444.789005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.789019] ? security_capable+0x99/0xc0 [ 1444.789037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1444.789057] ? ns_capable_common+0x13f/0x170 [ 1444.835112] bpf_btf_load+0x55/0x70 [ 1444.838769] __x64_sys_bpf+0x4ad/0x520 [ 1444.842673] ? bpf_prog_get+0x20/0x20 [ 1444.846499] do_syscall_64+0x1b9/0x820 [ 1444.850396] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1444.855805] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1444.860744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1444.865600] ? trace_hardirqs_on_caller+0x310/0x310 [ 1444.870663] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1444.875697] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1444.880732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1444.885606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.890804] RIP: 0033:0x457759 [ 1444.894003] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.912915] RSP: 002b:00007f3f499afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 02:17:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x300000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x1800}, 0x10) [ 1444.920636] RAX: ffffffffffffffda RBX: 00007f3f499afc90 RCX: 0000000000457759 [ 1444.927913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000012 [ 1444.935216] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1444.935724] FAULT_INJECTION: forcing a failure. [ 1444.935724] name failslab, interval 1, probability 0, space 0, times 0 [ 1444.942491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f499b06d4 [ 1444.942501] R13: 00000000004bdc65 R14: 00000000004cdc18 R15: 0000000000000005 [ 1444.984243] CPU: 1 PID: 877 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1444.991148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.000506] Call Trace: [ 1445.003113] dump_stack+0x1d3/0x2c6 [ 1445.006766] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1445.011978] ? blkg_create+0x94b/0x16d0 [ 1445.015976] should_fail.cold.4+0xa/0x17 [ 1445.020058] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1445.025169] ? do_raw_spin_unlock+0xa7/0x330 [ 1445.029608] ? do_raw_spin_trylock+0x270/0x270 [ 1445.034215] ? wb_wakeup_delayed+0xf0/0xf0 [ 1445.038466] ? graph_lock+0x270/0x270 [ 1445.042286] ? _raw_spin_unlock+0x2c/0x50 [ 1445.046485] ? blkg_create+0x950/0x16d0 [ 1445.050471] ? find_held_lock+0x36/0x1c0 [ 1445.054565] ? __lock_is_held+0xb5/0x140 [ 1445.058658] ? ___might_sleep+0x1ed/0x300 [ 1445.062810] ? arch_local_save_flags+0x40/0x40 [ 1445.067409] __should_failslab+0x124/0x180 [ 1445.071651] should_failslab+0x9/0x14 [ 1445.075457] kmem_cache_alloc_trace+0x2d7/0x750 [ 1445.080134] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1445.085064] ? kasan_check_read+0x11/0x20 [ 1445.089221] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1445.094500] ? rcu_softirq_qs+0x20/0x20 [ 1445.098487] blk_iolatency_init+0x51/0x2e0 [ 1445.102734] blkcg_init_queue+0x1e3/0x560 [ 1445.106896] blk_alloc_queue_node+0x972/0xe80 [ 1445.111408] ? blk_init_allocated_queue+0x640/0x640 [ 1445.116432] ? __mutex_init+0x1f7/0x290 [ 1445.120431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1445.125974] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1445.130747] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1445.135959] blk_mq_init_queue+0x4b/0xb0 [ 1445.140028] loop_add+0x376/0xa40 [ 1445.143501] ? loop_queue_rq+0x690/0x690 [ 1445.147580] loop_control_ioctl+0x199/0x530 [ 1445.151906] ? loop_add+0xa40/0xa40 [ 1445.155560] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1445.160497] ? loop_add+0xa40/0xa40 [ 1445.164155] do_vfs_ioctl+0x1de/0x1790 [ 1445.168067] ? __lock_is_held+0xb5/0x140 [ 1445.172137] ? ioctl_preallocate+0x300/0x300 [ 1445.176552] ? memset+0x31/0x40 [ 1445.179842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1445.185388] ? smack_file_ioctl+0x210/0x3c0 [ 1445.189714] ? fget_raw+0x20/0x20 [ 1445.193171] ? smack_file_lock+0x2e0/0x2e0 [ 1445.197417] ? fput+0x130/0x1a0 [ 1445.200724] ? do_syscall_64+0x9a/0x820 [ 1445.204704] ? do_syscall_64+0x9a/0x820 [ 1445.208694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1445.214232] ? security_file_ioctl+0x94/0xc0 [ 1445.218667] ksys_ioctl+0xa9/0xd0 [ 1445.222131] __x64_sys_ioctl+0x73/0xb0 [ 1445.226026] do_syscall_64+0x1b9/0x820 [ 1445.229916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1445.235299] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1445.240228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1445.245077] ? trace_hardirqs_on_caller+0x310/0x310 [ 1445.250097] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1445.255142] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1445.260171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1445.265026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1445.270218] RIP: 0033:0x457759 [ 1445.273414] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1445.292312] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1445.300026] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1445.307292] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1445.314590] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1445.321866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:17:45 executing program 1 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) [ 1445.329141] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x25f7}, 0x10) 02:17:45 executing program 4 (fault-call:10 fault-nth:24): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000}, 0x10) 02:17:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) 02:17:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='j.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x601c109700000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x1200}, 0x10) 02:17:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x15, 0x0, 0x0) 02:17:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xc00}, 0x10) 02:17:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x2, 0x0, 0x0) [ 1445.840333] FAULT_INJECTION: forcing a failure. [ 1445.840333] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.852004] CPU: 1 PID: 933 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1445.852056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.868242] Call Trace: [ 1445.868265] dump_stack+0x1d3/0x2c6 [ 1445.868286] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1445.868304] ? mark_held_locks+0x130/0x130 [ 1445.868330] should_fail.cold.4+0xa/0x17 [ 1445.874533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1445.874563] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1445.874609] ? pcpu_balance_workfn+0x1700/0x1700 [ 1445.884014] ? graph_lock+0x270/0x270 [ 1445.884038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1445.884057] ? check_preemption_disabled+0x48/0x280 [ 1445.907314] ? lock_acquire+0x1ed/0x520 [ 1445.907340] __should_failslab+0x124/0x180 [ 1445.917887] should_failslab+0x9/0x14 [ 1445.917906] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1445.917924] ? rwlock_bug.part.2+0x90/0x90 [ 1445.917941] ? trace_hardirqs_on+0x310/0x310 [ 1445.917965] iolatency_pd_alloc+0x93/0x120 [ 1445.917985] ? iolatency_set_limit+0x620/0x620 [ 1445.952395] blkcg_activate_policy+0x221/0x580 [ 1445.957007] blk_iolatency_init+0x130/0x2e0 [ 1445.961350] blkcg_init_queue+0x1e3/0x560 [ 1445.966027] blk_alloc_queue_node+0x972/0xe80 [ 1445.970545] ? blk_init_allocated_queue+0x640/0x640 [ 1445.975575] ? __mutex_init+0x1f7/0x290 [ 1445.979584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1445.985136] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1445.989943] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1445.995153] blk_mq_init_queue+0x4b/0xb0 [ 1445.999231] loop_add+0x376/0xa40 [ 1446.002705] ? loop_queue_rq+0x690/0x690 [ 1446.006806] loop_control_ioctl+0x199/0x530 [ 1446.011146] ? loop_add+0xa40/0xa40 [ 1446.014795] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1446.019751] ? loop_add+0xa40/0xa40 [ 1446.023403] do_vfs_ioctl+0x1de/0x1790 [ 1446.027316] ? __lock_is_held+0xb5/0x140 [ 1446.031403] ? ioctl_preallocate+0x300/0x300 [ 1446.035834] ? memset+0x31/0x40 [ 1446.039151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.044709] ? smack_file_ioctl+0x210/0x3c0 [ 1446.049044] ? fget_raw+0x20/0x20 [ 1446.052511] ? smack_file_lock+0x2e0/0x2e0 [ 1446.056767] ? fput+0x130/0x1a0 [ 1446.060062] ? do_syscall_64+0x9a/0x820 [ 1446.064048] ? do_syscall_64+0x9a/0x820 [ 1446.068089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.073645] ? security_file_ioctl+0x94/0xc0 [ 1446.078072] ksys_ioctl+0xa9/0xd0 [ 1446.081576] __x64_sys_ioctl+0x73/0xb0 [ 1446.085480] do_syscall_64+0x1b9/0x820 [ 1446.089387] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1446.094774] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1446.099715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1446.104591] ? trace_hardirqs_on_caller+0x310/0x310 [ 1446.109617] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1446.114643] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1446.119674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1446.124536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1446.129733] RIP: 0033:0x457759 [ 1446.132937] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.151847] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1446.159566] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1446.166840] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1446.174125] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1446.181405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1446.188695] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:46 executing program 4 (fault-call:10 fault-nth:25): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x3f000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='j/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xebffffff00000000}, 0x10) 02:17:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 02:17:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xb, 0x0, 0x0) 02:17:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18000000}, 0x10) 02:17:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfec00000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xc000000}, 0x10) 02:17:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1446.387146] FAULT_INJECTION: forcing a failure. [ 1446.387146] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.437324] CPU: 1 PID: 953 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1446.444221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.453579] Call Trace: [ 1446.456208] dump_stack+0x1d3/0x2c6 [ 1446.459857] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1446.465061] ? rcu_softirq_qs+0x20/0x20 [ 1446.469050] should_fail.cold.4+0xa/0x17 [ 1446.473151] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1446.478272] ? kernel_text_address+0x79/0xf0 [ 1446.482693] ? __kernel_text_address+0xd/0x40 [ 1446.487204] ? __save_stack_trace+0x8d/0xf0 [ 1446.491544] ? graph_lock+0x270/0x270 [ 1446.495380] ? find_held_lock+0x36/0x1c0 [ 1446.499463] ? __lock_is_held+0xb5/0x140 [ 1446.503614] ? rose_remove_route+0x238/0x270 [ 1446.508058] ? ___might_sleep+0x1ed/0x300 [ 1446.512245] ? arch_local_save_flags+0x40/0x40 [ 1446.516858] ? mark_held_locks+0xc7/0x130 [ 1446.521020] ? _raw_spin_unlock_irq+0x27/0x80 [ 1446.525533] __should_failslab+0x124/0x180 [ 1446.529782] should_failslab+0x9/0x14 [ 1446.533625] kmem_cache_alloc_node_trace+0x270/0x740 [ 1446.538744] ? __lock_is_held+0xb5/0x140 [ 1446.542828] iolatency_pd_alloc+0x93/0x120 [ 1446.547078] ? blk_queue_bypass_start+0x196/0x2c0 [ 1446.551939] ? iolatency_set_limit+0x620/0x620 [ 1446.556532] blkcg_activate_policy+0xf4/0x580 [ 1446.561040] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1446.565977] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1446.571274] blk_iolatency_init+0x130/0x2e0 [ 1446.575631] blkcg_init_queue+0x1e3/0x560 [ 1446.579799] blk_alloc_queue_node+0x972/0xe80 [ 1446.584313] ? blk_init_allocated_queue+0x640/0x640 [ 1446.589405] ? __mutex_init+0x1f7/0x290 [ 1446.593423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.598978] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1446.603777] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1446.609007] blk_mq_init_queue+0x4b/0xb0 [ 1446.613080] loop_add+0x376/0xa40 [ 1446.616551] ? loop_queue_rq+0x690/0x690 [ 1446.620653] loop_control_ioctl+0x199/0x530 [ 1446.624986] ? loop_add+0xa40/0xa40 [ 1446.628633] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1446.633604] ? loop_add+0xa40/0xa40 [ 1446.637262] do_vfs_ioctl+0x1de/0x1790 [ 1446.641165] ? __lock_is_held+0xb5/0x140 [ 1446.645240] ? ioctl_preallocate+0x300/0x300 [ 1446.649658] ? memset+0x31/0x40 [ 1446.652948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.658488] ? smack_file_ioctl+0x210/0x3c0 [ 1446.662810] ? fget_raw+0x20/0x20 [ 1446.666267] ? smack_file_lock+0x2e0/0x2e0 [ 1446.670508] ? fput+0x130/0x1a0 [ 1446.673806] ? do_syscall_64+0x9a/0x820 [ 1446.677816] ? do_syscall_64+0x9a/0x820 [ 1446.681800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.687343] ? security_file_ioctl+0x94/0xc0 [ 1446.691770] ksys_ioctl+0xa9/0xd0 [ 1446.695267] __x64_sys_ioctl+0x73/0xb0 [ 1446.699181] do_syscall_64+0x1b9/0x820 [ 1446.703070] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1446.708458] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1446.713397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1446.718263] ? trace_hardirqs_on_caller+0x310/0x310 [ 1446.723284] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1446.728311] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1446.733363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1446.738219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1446.743412] RIP: 0033:0x457759 [ 1446.746608] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.765512] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1446.773222] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1446.780494] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 02:17:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xc}, 0x10) [ 1446.787767] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.795052] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1446.802317] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:47 executing program 4 (fault-call:10 fault-nth:26): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xc00000000000000}, 0x10) 02:17:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xf, 0x0, 0x0) 02:17:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfp\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xff000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1446.983250] FAULT_INJECTION: forcing a failure. [ 1446.983250] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.994488] CPU: 1 PID: 979 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1447.001353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1447.010745] Call Trace: [ 1447.013376] dump_stack+0x1d3/0x2c6 [ 1447.017032] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1447.022243] ? mark_held_locks+0x130/0x130 [ 1447.026519] should_fail.cold.4+0xa/0x17 02:17:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x1800000000000000}, 0x10) 02:17:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x40000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1447.030617] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1447.035753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1447.041333] ? pcpu_balance_workfn+0x1700/0x1700 [ 1447.046161] ? graph_lock+0x270/0x270 [ 1447.049980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.055529] ? check_preemption_disabled+0x48/0x280 [ 1447.060581] ? lock_acquire+0x1ed/0x520 [ 1447.064573] __should_failslab+0x124/0x180 [ 1447.068816] should_failslab+0x9/0x14 [ 1447.072643] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1447.077682] ? rwlock_bug.part.2+0x90/0x90 [ 1447.081932] ? trace_hardirqs_on+0x310/0x310 [ 1447.086391] iolatency_pd_alloc+0x93/0x120 [ 1447.090639] ? iolatency_set_limit+0x620/0x620 [ 1447.095236] blkcg_activate_policy+0x221/0x580 [ 1447.099846] blk_iolatency_init+0x130/0x2e0 [ 1447.104190] blkcg_init_queue+0x1e3/0x560 [ 1447.108378] blk_alloc_queue_node+0x972/0xe80 [ 1447.112896] ? blk_init_allocated_queue+0x640/0x640 [ 1447.117929] ? __mutex_init+0x1f7/0x290 [ 1447.121944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.127494] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1447.132275] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1447.137487] blk_mq_init_queue+0x4b/0xb0 [ 1447.141563] loop_add+0x376/0xa40 [ 1447.145036] ? loop_queue_rq+0x690/0x690 [ 1447.149131] loop_control_ioctl+0x199/0x530 [ 1447.153470] ? loop_add+0xa40/0xa40 [ 1447.157127] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1447.162077] ? loop_add+0xa40/0xa40 [ 1447.165720] do_vfs_ioctl+0x1de/0x1790 [ 1447.169637] ? __lock_is_held+0xb5/0x140 [ 1447.173722] ? ioctl_preallocate+0x300/0x300 [ 1447.178150] ? memset+0x31/0x40 [ 1447.181452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.187002] ? smack_file_ioctl+0x210/0x3c0 [ 1447.191336] ? fget_raw+0x20/0x20 [ 1447.194812] ? smack_file_lock+0x2e0/0x2e0 [ 1447.199111] ? fput+0x130/0x1a0 [ 1447.202426] ? do_syscall_64+0x9a/0x820 [ 1447.206437] ? do_syscall_64+0x9a/0x820 [ 1447.210431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.215987] ? security_file_ioctl+0x94/0xc0 [ 1447.220413] ksys_ioctl+0xa9/0xd0 [ 1447.223879] __x64_sys_ioctl+0x73/0xb0 [ 1447.227782] do_syscall_64+0x1b9/0x820 02:17:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffff00000000}, 0x10) [ 1447.231683] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1447.237061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1447.241999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1447.246875] ? trace_hardirqs_on_caller+0x310/0x310 [ 1447.251907] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1447.256954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1447.261990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1447.266869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1447.272067] RIP: 0033:0x457759 02:17:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x4, 0x0, 0x0) [ 1447.275269] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1447.294174] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1447.301901] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1447.309178] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1447.316453] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1447.323734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:17:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x600}, 0x10) [ 1447.331015] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xfc', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:47 executing program 4 (fault-call:10 fault-nth:27): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x5, 0x0, 0x0) 02:17:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xff0f, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x12}, 0x10) 02:17:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfi\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xe, 0x0, 0x0) 02:17:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffffffff000}, 0x10) [ 1447.663309] FAULT_INJECTION: forcing a failure. [ 1447.663309] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.694032] CPU: 1 PID: 1018 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1447.700995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1447.710371] Call Trace: [ 1447.712993] dump_stack+0x1d3/0x2c6 [ 1447.716641] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1447.721853] ? trace_hardirqs_on+0xbd/0x310 [ 1447.726185] ? kasan_check_read+0x11/0x20 [ 1447.730345] ? __debug_object_init+0x57d/0x1290 [ 1447.735045] should_fail.cold.4+0xa/0x17 [ 1447.739130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1447.744248] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1447.749372] ? __debug_object_init+0x57d/0x1290 [ 1447.754067] ? graph_lock+0x270/0x270 [ 1447.757879] ? debug_object_free+0x690/0x690 [ 1447.762324] ? print_usage_bug+0xc0/0xc0 [ 1447.766408] ? blkcg_init_queue+0x1e3/0x560 [ 1447.770738] ? blk_alloc_queue_node+0x972/0xe80 [ 1447.775480] ? blk_mq_init_queue+0x4b/0xb0 [ 1447.779726] ? loop_add+0x376/0xa40 [ 1447.783381] ? find_held_lock+0x36/0x1c0 [ 1447.787467] ? __lock_is_held+0xb5/0x140 [ 1447.791603] ? enter_smm+0x2928/0x3c60 [ 1447.795522] ? ___might_sleep+0x1ed/0x300 [ 1447.799685] ? arch_local_save_flags+0x40/0x40 [ 1447.804278] ? __lock_is_held+0xb5/0x140 [ 1447.808396] __should_failslab+0x124/0x180 [ 1447.812677] should_failslab+0x9/0x14 [ 1447.816521] kmem_cache_alloc_node_trace+0x270/0x740 [ 1447.821639] ? blkcg_iolatency_throttle+0x20d0/0x20d0 [ 1447.826845] ? init_timer_on_stack_key+0xe0/0xe0 [ 1447.831621] blk_throtl_init+0xca/0x630 [ 1447.835719] ? blk_throtl_drain+0x810/0x810 [ 1447.840058] ? blk_iolatency_init+0x1f7/0x2e0 [ 1447.844573] blkcg_init_queue+0x205/0x560 [ 1447.848738] blk_alloc_queue_node+0x972/0xe80 [ 1447.853254] ? blk_init_allocated_queue+0x640/0x640 [ 1447.858285] ? __mutex_init+0x1f7/0x290 [ 1447.862295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.867855] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1447.872636] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1447.877840] blk_mq_init_queue+0x4b/0xb0 [ 1447.881916] loop_add+0x376/0xa40 [ 1447.885395] ? loop_queue_rq+0x690/0x690 [ 1447.889485] loop_control_ioctl+0x199/0x530 [ 1447.893818] ? loop_add+0xa40/0xa40 [ 1447.897470] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1447.902419] ? loop_add+0xa40/0xa40 [ 1447.906073] do_vfs_ioctl+0x1de/0x1790 [ 1447.909976] ? __lock_is_held+0xb5/0x140 [ 1447.914051] ? ioctl_preallocate+0x300/0x300 [ 1447.918473] ? memset+0x31/0x40 [ 1447.921771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.927324] ? smack_file_ioctl+0x210/0x3c0 [ 1447.931666] ? fget_raw+0x20/0x20 [ 1447.935136] ? smack_file_lock+0x2e0/0x2e0 [ 1447.939397] ? fput+0x130/0x1a0 [ 1447.942685] ? do_syscall_64+0x9a/0x820 [ 1447.946678] ? do_syscall_64+0x9a/0x820 [ 1447.950663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.956204] ? security_file_ioctl+0x94/0xc0 [ 1447.960635] ksys_ioctl+0xa9/0xd0 [ 1447.964100] __x64_sys_ioctl+0x73/0xb0 [ 1447.968013] do_syscall_64+0x1b9/0x820 [ 1447.971908] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1447.977281] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1447.982213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1447.987081] ? trace_hardirqs_on_caller+0x310/0x310 [ 1447.992099] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1447.997135] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1448.002160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1448.007018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1448.012211] RIP: 0033:0x457759 [ 1448.015410] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1448.034312] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1448.042019] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1448.049289] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1448.056558] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 02:17:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xfd', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x1200000000000000}, 0x10) [ 1448.063829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1448.071122] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf0ffffffffffff}, 0x10) 02:17:48 executing program 4 (fault-call:10 fault-nth:28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x13, 0x0, 0x0) 02:17:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf0ffff}, 0x10) 02:17:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1448.286849] FAULT_INJECTION: forcing a failure. [ 1448.286849] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.336575] CPU: 0 PID: 1060 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1448.343559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.352919] Call Trace: [ 1448.355525] dump_stack+0x1d3/0x2c6 [ 1448.359166] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1448.364375] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1448.369491] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1448.374616] should_fail.cold.4+0xa/0x17 [ 1448.378699] ? mark_held_locks+0x130/0x130 [ 1448.382950] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1448.388075] ? __debug_object_init+0x57d/0x1290 [ 1448.392754] ? find_held_lock+0x36/0x1c0 [ 1448.396839] ? graph_lock+0x270/0x270 [ 1448.400662] ? find_held_lock+0x36/0x1c0 [ 1448.404753] ? __lock_is_held+0xb5/0x140 [ 1448.408833] ? ___might_sleep+0x1ed/0x300 [ 1448.412993] ? check_preemption_disabled+0x48/0x280 [ 1448.418017] ? arch_local_save_flags+0x40/0x40 [ 1448.422628] __should_failslab+0x124/0x180 [ 1448.426890] should_failslab+0x9/0x14 [ 1448.430700] kmem_cache_alloc_node_trace+0x270/0x740 [ 1448.435812] ? mark_held_locks+0xc7/0x130 [ 1448.439971] ? _raw_spin_unlock_irq+0x27/0x80 [ 1448.444501] throtl_pd_alloc+0xff/0x990 [ 1448.448497] ? blk_queue_bypass_start+0x151/0x2c0 [ 1448.453351] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1448.458651] ? __lock_is_held+0xb5/0x140 [ 1448.462758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1448.468323] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1448.473626] blkcg_activate_policy+0xf4/0x580 [ 1448.478151] blk_throtl_init+0x3d3/0x630 [ 1448.482223] ? blk_throtl_drain+0x810/0x810 [ 1448.486560] ? blk_iolatency_init+0x1f7/0x2e0 [ 1448.491069] blkcg_init_queue+0x205/0x560 [ 1448.495234] blk_alloc_queue_node+0x972/0xe80 [ 1448.499763] ? blk_init_allocated_queue+0x640/0x640 [ 1448.504802] ? __mutex_init+0x1f7/0x290 [ 1448.508809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.514377] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1448.519161] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1448.524383] blk_mq_init_queue+0x4b/0xb0 [ 1448.528459] loop_add+0x376/0xa40 [ 1448.531924] ? loop_queue_rq+0x690/0x690 [ 1448.536006] loop_control_ioctl+0x199/0x530 [ 1448.540338] ? loop_add+0xa40/0xa40 [ 1448.543989] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1448.548944] ? loop_add+0xa40/0xa40 [ 1448.552579] do_vfs_ioctl+0x1de/0x1790 [ 1448.556497] ? __lock_is_held+0xb5/0x140 [ 1448.560572] ? ioctl_preallocate+0x300/0x300 [ 1448.564988] ? memset+0x31/0x40 [ 1448.568307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.573854] ? smack_file_ioctl+0x210/0x3c0 [ 1448.578183] ? fget_raw+0x20/0x20 [ 1448.581646] ? smack_file_lock+0x2e0/0x2e0 [ 1448.585900] ? fput+0x130/0x1a0 [ 1448.589188] ? do_syscall_64+0x9a/0x820 [ 1448.593169] ? do_syscall_64+0x9a/0x820 [ 1448.597162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.602711] ? security_file_ioctl+0x94/0xc0 [ 1448.607149] ksys_ioctl+0xa9/0xd0 [ 1448.610615] __x64_sys_ioctl+0x73/0xb0 [ 1448.614537] do_syscall_64+0x1b9/0x820 [ 1448.618434] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1448.623809] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1448.628764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1448.633629] ? trace_hardirqs_on_caller+0x310/0x310 [ 1448.638688] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1448.643729] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1448.648759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1448.653639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1448.658836] RIP: 0033:0x457759 [ 1448.662041] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:17:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x3, 0x0, 0x0) 02:17:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xf725}, 0x10) [ 1448.680945] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1448.688661] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1448.695935] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1448.703207] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1448.710511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1448.717786] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:49 executing program 4 (fault-call:10 fault-nth:29): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x4000000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xc, 0x0, 0x0) 02:17:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x3f00}, 0x10) [ 1448.879536] FAULT_INJECTION: forcing a failure. [ 1448.879536] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.892984] CPU: 0 PID: 1083 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1448.899947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.909303] Call Trace: [ 1448.911909] dump_stack+0x1d3/0x2c6 [ 1448.915554] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1448.920774] ? graph_lock+0x270/0x270 [ 1448.924593] should_fail.cold.4+0xa/0x17 [ 1448.928678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1448.933792] ? __lock_is_held+0xb5/0x140 [ 1448.937872] ? graph_lock+0x270/0x270 [ 1448.941695] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1448.947250] ? pcpu_alloc+0x190/0x15e0 [ 1448.951159] ? find_held_lock+0x36/0x1c0 [ 1448.955235] ? __lock_is_held+0xb5/0x140 [ 1448.959319] ? ___might_sleep+0x1ed/0x300 [ 1448.963485] ? __lockdep_init_map+0x105/0x590 [ 1448.968192] ? arch_local_save_flags+0x40/0x40 [ 1448.972791] ? kobject_init+0x23d/0x2f0 [ 1448.976787] __should_failslab+0x124/0x180 [ 1448.981033] should_failslab+0x9/0x14 [ 1448.984859] kmem_cache_alloc_node_trace+0x270/0x740 [ 1448.990004] ? find_next_bit+0x104/0x130 [ 1448.994097] __kmalloc_node+0x3c/0x70 [ 1448.997916] blk_mq_init_allocated_queue+0x227/0x1680 [ 1449.003119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.008668] ? blk_alloc_queue_node+0x988/0xe80 [ 1449.013351] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1449.017872] ? __mutex_init+0x1f7/0x290 [ 1449.021879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.027427] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1449.032224] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1449.037428] blk_mq_init_queue+0x63/0xb0 [ 1449.041501] loop_add+0x376/0xa40 [ 1449.044969] ? loop_queue_rq+0x690/0x690 [ 1449.049070] loop_control_ioctl+0x199/0x530 [ 1449.053403] ? loop_add+0xa40/0xa40 [ 1449.057048] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1449.061996] ? loop_add+0xa40/0xa40 [ 1449.065643] do_vfs_ioctl+0x1de/0x1790 [ 1449.069542] ? __lock_is_held+0xb5/0x140 [ 1449.073625] ? ioctl_preallocate+0x300/0x300 [ 1449.078058] ? memset+0x31/0x40 [ 1449.081390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.086940] ? smack_file_ioctl+0x210/0x3c0 [ 1449.091272] ? fget_raw+0x20/0x20 [ 1449.094746] ? smack_file_lock+0x2e0/0x2e0 [ 1449.099001] ? fput+0x130/0x1a0 [ 1449.102289] ? do_syscall_64+0x9a/0x820 [ 1449.106272] ? do_syscall_64+0x9a/0x820 [ 1449.110262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.115807] ? security_file_ioctl+0x94/0xc0 [ 1449.120228] ksys_ioctl+0xa9/0xd0 [ 1449.123699] __x64_sys_ioctl+0x73/0xb0 [ 1449.127601] do_syscall_64+0x1b9/0x820 [ 1449.131505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1449.136876] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1449.141841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.146698] ? trace_hardirqs_on_caller+0x310/0x310 [ 1449.151742] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1449.156768] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1449.161801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.166671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.171872] RIP: 0033:0x457759 [ 1449.175075] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.193980] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1449.201696] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1449.208967] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1449.216245] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1449.223518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:17:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffeb}, 0x10) 02:17:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xd, 0x0, 0x0) 02:17:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xa00000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1449.230792] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x48) 02:17:49 executing program 4 (fault-call:10 fault-nth:30): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x8, 0x0, 0x0) 02:17:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x20000190) 02:17:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xeffdffff00000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1449.505464] FAULT_INJECTION: forcing a failure. [ 1449.505464] name failslab, interval 1, probability 0, space 0, times 0 02:17:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x10, 0x0, 0x0) [ 1449.545865] CPU: 1 PID: 1115 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1449.552811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.562170] Call Trace: [ 1449.564769] dump_stack+0x1d3/0x2c6 [ 1449.568442] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1449.573665] ? graph_lock+0x270/0x270 [ 1449.577517] should_fail.cold.4+0xa/0x17 [ 1449.581591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1449.586721] ? __lock_is_held+0xb5/0x140 [ 1449.590813] ? graph_lock+0x270/0x270 [ 1449.594640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1449.600184] ? pcpu_alloc+0x190/0x15e0 [ 1449.604092] ? find_held_lock+0x36/0x1c0 [ 1449.608164] ? __lock_is_held+0xb5/0x140 [ 1449.612238] ? ___might_sleep+0x1ed/0x300 [ 1449.616408] ? __lockdep_init_map+0x105/0x590 [ 1449.620903] ? arch_local_save_flags+0x40/0x40 [ 1449.625490] ? kobject_init+0x23d/0x2f0 [ 1449.629473] __should_failslab+0x124/0x180 [ 1449.633739] should_failslab+0x9/0x14 [ 1449.637547] kmem_cache_alloc_node_trace+0x270/0x740 02:17:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400602, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0xfffffffffffffe42, 0xfa00, {0x41, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xfffffffffffffff9}}, 0x2b0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r2, 0x695}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) [ 1449.642670] ? find_next_bit+0x104/0x130 [ 1449.646807] __kmalloc_node+0x3c/0x70 [ 1449.650616] blk_mq_init_allocated_queue+0x227/0x1680 [ 1449.655832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.661391] ? blk_alloc_queue_node+0x988/0xe80 [ 1449.666087] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1449.670594] ? __mutex_init+0x1f7/0x290 [ 1449.674617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.680201] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1449.684976] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1449.690211] blk_mq_init_queue+0x63/0xb0 [ 1449.694301] loop_add+0x376/0xa40 [ 1449.697773] ? loop_queue_rq+0x690/0x690 [ 1449.701857] loop_control_ioctl+0x199/0x530 [ 1449.706183] ? loop_add+0xa40/0xa40 [ 1449.709826] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1449.714767] ? loop_add+0xa40/0xa40 [ 1449.718405] do_vfs_ioctl+0x1de/0x1790 [ 1449.722301] ? __lock_is_held+0xb5/0x140 [ 1449.726399] ? ioctl_preallocate+0x300/0x300 [ 1449.730832] ? memset+0x31/0x40 [ 1449.734124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.739688] ? smack_file_ioctl+0x210/0x3c0 [ 1449.744019] ? fget_raw+0x20/0x20 [ 1449.747481] ? smack_file_lock+0x2e0/0x2e0 [ 1449.751729] ? fput+0x130/0x1a0 [ 1449.755071] ? do_syscall_64+0x9a/0x820 [ 1449.759069] ? do_syscall_64+0x9a/0x820 [ 1449.763084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.768649] ? security_file_ioctl+0x94/0xc0 [ 1449.773096] ksys_ioctl+0xa9/0xd0 [ 1449.776568] __x64_sys_ioctl+0x73/0xb0 [ 1449.780500] do_syscall_64+0x1b9/0x820 [ 1449.784410] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1449.789794] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1449.794727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.799582] ? trace_hardirqs_on_caller+0x310/0x310 [ 1449.804603] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1449.809625] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1449.814700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.819561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.824751] RIP: 0033:0x457759 [ 1449.827954] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.846891] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1449.854601] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1449.861874] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1449.869176] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1449.876467] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1449.883782] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, &(0x7f00000001c0)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$KDDELIO(r1, 0x4b35, 0x8) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x3, 0x1, &(0x7f0000000100)={r2, r3+30000000}, &(0x7f0000000140)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:50 executing program 4 (fault-call:10 fault-nth:31): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x11, 0x0, 0x0) 02:17:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xa000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1450.051102] FAULT_INJECTION: forcing a failure. [ 1450.051102] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.093009] CPU: 1 PID: 1149 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1450.099956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.109310] Call Trace: [ 1450.111918] dump_stack+0x1d3/0x2c6 [ 1450.115573] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1450.120789] should_fail.cold.4+0xa/0x17 [ 1450.124854] ? blk_mq_realloc_hw_ctxs+0xfe/0x12a0 [ 1450.129707] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1450.134819] ? mutex_trylock+0x2b0/0x2b0 [ 1450.138885] ? find_held_lock+0x36/0x1c0 [ 1450.142960] ? graph_lock+0x270/0x270 [ 1450.142976] ? is_bpf_text_address+0xac/0x170 [ 1450.142995] ? lock_downgrade+0x900/0x900 [ 1450.143011] ? check_preemption_disabled+0x48/0x280 [ 1450.143030] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1450.165424] ? kasan_check_read+0x11/0x20 [ 1450.169585] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1450.174879] ? __lock_is_held+0xb5/0x140 [ 1450.178948] ? unwind_dump+0x190/0x190 [ 1450.182854] ? ___might_sleep+0x1ed/0x300 [ 1450.187017] ? kernel_text_address+0x79/0xf0 [ 1450.191451] ? arch_local_save_flags+0x40/0x40 [ 1450.196060] ? __kernel_text_address+0xd/0x40 [ 1450.200592] ? unwind_get_return_address+0x61/0xa0 [ 1450.205536] ? __save_stack_trace+0x8d/0xf0 [ 1450.209873] __should_failslab+0x124/0x180 [ 1450.214142] should_failslab+0x9/0x14 [ 1450.217955] kmem_cache_alloc_node_trace+0x270/0x740 [ 1450.223085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1450.228697] ? find_next_bit+0x104/0x130 [ 1450.232779] __kmalloc_node+0x3c/0x70 [ 1450.236603] blk_mq_realloc_hw_ctxs+0x295/0x12a0 [ 1450.241387] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1450.246799] ? __lock_is_held+0xb5/0x140 [ 1450.250882] ? __kmalloc_node+0x3c/0x70 [ 1450.254871] ? __kmalloc_node+0x3c/0x70 [ 1450.258862] ? rcu_read_lock_sched_held+0x108/0x120 [ 1450.263894] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1450.269183] ? kasan_unpoison_shadow+0x35/0x50 [ 1450.273777] ? kasan_kmalloc+0xc7/0xe0 [ 1450.277689] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1450.282897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.288451] ? blk_alloc_queue_node+0x988/0xe80 [ 1450.293168] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1450.297675] ? __mutex_init+0x1f7/0x290 [ 1450.301686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.307234] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1450.312015] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1450.317235] blk_mq_init_queue+0x63/0xb0 [ 1450.321313] loop_add+0x376/0xa40 [ 1450.324780] ? loop_queue_rq+0x690/0x690 [ 1450.328865] loop_control_ioctl+0x199/0x530 [ 1450.333197] ? loop_add+0xa40/0xa40 [ 1450.336843] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1450.341805] ? loop_add+0xa40/0xa40 [ 1450.345450] do_vfs_ioctl+0x1de/0x1790 [ 1450.349350] ? __lock_is_held+0xb5/0x140 [ 1450.353460] ? ioctl_preallocate+0x300/0x300 [ 1450.357880] ? memset+0x31/0x40 [ 1450.361190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.366735] ? smack_file_ioctl+0x210/0x3c0 [ 1450.371096] ? fget_raw+0x20/0x20 [ 1450.374576] ? smack_file_lock+0x2e0/0x2e0 [ 1450.378827] ? fput+0x130/0x1a0 [ 1450.382143] ? do_syscall_64+0x9a/0x820 [ 1450.386148] ? do_syscall_64+0x9a/0x820 02:17:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0xa, 0x0, 0x0) 02:17:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f00000014c0)=[{&(0x7f0000000280)="cadbaf96f11a5d38e5cd59b0d14d862793ae1545c30451b53426b929a578c860faf456f824813b41574dca99f94cfc1c92a090c5402787e82ad45524f7a371209af904de54b82f8c341aa3616c9380aa8482050326fd6b05ea3dd4c3f190b7bf428c99698b2943b303e75c09335f4e5909f305862c8913f3bc3c8f7a39cc02a2af7df132a73a44409b2165d479d856d5293d7a4de27b797d69a1d914b14db012e9abd58dc2dd0f785393bc09aa35ae546669e139814d584a3ac9806952be2a40d76cdbf8f8f3e8db973722372b3d34e3f8536c38c8bd9e717886f7545a277a59ed0543dc2ba861", 0xe7, 0x8556}, {&(0x7f0000000380)="fd6e027f4b6a3c0a4dd4d85eed689920f86724dafffdd97a978aecea82b4f5f717f24be254ee441bd88c09e3ad95b2a5a402b9b18edc06bd15db54d13e13463e15d5904e336ad06f2d4f15910fa7d964bb11f71a83fde982c5e425a7953651ad5141ee2c2d0727e8ff9335f58f612e49d3259b493c838c069b2a166d589f355851e9088329371968f2e95e9da7dcc8ea00a3472c9cd0482cdb7f186e7920501b549dc4187c19571436636e6208370fb86de4bf3136fe5614478019781bf2da14d12eb167864a817d05d985f0ce4b5cbe669d10a846c122ad59e25656f8", 0xdd, 0x10000}, {&(0x7f0000000080)="793c3ff758995f0dac47e3e17f13540d96b875f7274d7056605941f5827b4b4b1ee5d12f3587959f7bb1e6e5e6e3f198dd163d16e5eb29f74c69a1bfcc145fb47f955737cffebae8aff8f348e08db48aea8b0434412ac7c29fe21e99a116fdbb356f7f3ddf3973facce1b5272d1aff37a5ee431276e5cb21231ec21862fbb4173b6af0217a178f5f120043435b4b6412d58198d0e1bc1c230f448e972aedfe", 0x9f, 0x1}, {&(0x7f0000000480)="cd53948c50766a43c58185e401eb365bba397d59b040cbcf15c7a59e50d3228a8e131954f9a855f3a4b033fa76a3f6ee0c8cb914bb94e12a37203c2bd83811d1375d7f747e5c58f51b8931dd873838d44ad83f62449226249c03fdb12792ae59f8a8e9c7068c8e20b8a6c0de11b9cfaf6e884b2694c65cf991bdaf6fcd2745d7605a0235e703d291f39fdedbee7c64e3dbfb085cea67323f2d2c615d8090d4102b006328619ab2b5f0f6eba2cc827503e1b33b1c31bb067efe2d10e2df5f5bbb84b5c8e2be494203530e320d6922640e9903d8c950b8a778853c42f3c31c71634e65421c85e6f361f88d92d2f4dc0cfdcb85572af38f25b039a92dad0da2b38e51cfc8b4464849b9c9052ebf218412e2f21491a961e1c49eae95f0b233167d4502949d386ba75b4eccff496a83767bb8c1dfc06b96e8d482fbcc99338eac98854f3bd68d3a57de1eaec327d856eea56a716db6d15d86df812c34f224c7e5d6dfb113c33f068cbfc3f5e52fd9314000287949c33d64caa40a3910bbf7417f1bd7e67e40b90a54f892f7e8d1f6f0e69f60ca3b6fd363996b59dc741ce3b4746d332f38b96ef9fb10790150d9ba40d6e6cd7c01d5487c3e12bd5469332b99251cd4118dfb1ffdb0cf5a8c94e686da07accc12e40f0ad741c48d4e72f3033c9ea9f9ae14b4beaf379b991062537f0aa9079a5a9bcee3db51fb52157823ea0ac4dac7e57b7d4b72d31cda3b243432e14ecd7b51f0b2e74de85f4674fe75adfd00be86dcbff646d18efbc4d6548434c4aafc486626b26051cda30f66076a3a8cfd8d0a17d3df04aef2333995d04d32047068b5a85f7f65256544dd9057095719face73bd06fa0747c8caa502b119f30ffd4190182e6c7380d15bd48a9a8380ad53ca8e3c939ebde5babe49bb6d0a319b376e2764a093fc4dec7f30b33413a92f01b8d7be4aafed30bb8e86e30e52a31cec49b70b6e9afe012020ac7dff01014def30df7566c8dbd40b5ecb64154745e468d48b5d5cb490e55aaa60173c04b3ae1fdf0d27151af60eaad3b82c2d4de27fa08285f5b6719f26e277c8c572c0d310dfb9339bbdc3307d8e07eb49001aef6d7fc8bc7a2097ae0678521b074b0714913d09513119d371318fecb254a60cded0610f5789b48946ff7807810018484751360d4aaea9423747442e9b9df9da5e1798fa598f6ffdd293d4a26de2c37d5bd4b8feba847113c6ad6f1e0de2be172adb2cdcc0874eaf5be80c67783af3634d0a8c424324b666d81bdb1f28d3d40407f6280c8c6dfdfe34a5ba3cb91555a099dd33bdbd623a2ecd532b0a2df3db0c6a98d46b2a44741b0d740f3dbabbd5321a88f2ccfacaceaea08bc0e31592acd933414d17a92838a32ca6791698db1f0d89c40040bb099e15bee4deeda148e932f49a4d80a94896e97d8f7904af2d48110157ecd4b2bdaf256a9b365b78199e2d00aaf6ac363470063f6e904c5c557d2bb3158954d94a763f955fd6d3deb0eed2e11c3e0a1c364124abb2f61c3b2548aa487c7a5bbd6c3e73387e9a1118e3549852f059d068e57c8c1e8942974414c0e3e523f260dfd40dba70a6b0afdd9117f55fa9a1344faa375960af0db5920c576c142b9ab3b8807d9581eae4d03dccbe2728f706d5a96ad616b8a5beeb86303d0f91058433245f4d01ad26d9f4d2896387a40946e8661de29f543297089a85fd332664674829303f7c63d53eb53f6cd5c94217c983e52937422e72e7956eaf162c86870cdc533cc7f689e764c2d105e651a8c13228a45b9c9a63ab630ea1d65c9362f552253ff3f88419391d00e7be80eb2deea0a4e02158ae278bbce3d8771aa07aefdad6219dfc4cda4bcc5bb0719cc2101ce914b235ff0625ef0936eb1ab4a18001fb4b31315037325685ae4969722b2ae9ff005074ddde991af563d78aa427a831aa8c6b26a9ac0aac902ee1452eb05165ebafdb006cbcc1e8f8cbb629992c879cb3f365697ea88af09cc00a3918353d763bf13c6d09c494f9f265d1551506795e04518352ad0e5dfcd45a887f0a9c262900ddc3935d209582c946d69507be5c5c08006dd831a94dc350a5eb599c280e524027d077e09b656f3db7ef32d022d3ce5a0da79b900f5e0a920f6943b41d23af93984a513bfb9b44231ed826a57f2edb7ef08bde8a6aee8eb591017ce2c62c37617d6ab40f05f92876d8bcbcf09a7420bb9b6fafcff939e76fd17585504ee1c80784ff5a4029f254616436d07f2587105ca41e504bbeea03ddab7fd54da83bce81a494c81acec7ab5a35db917a748217bdb2be0099477ad0766d7c76b8a5d19fdee1c0dc2ce91a9af8ed835e70e2c5dbb9c4fa5140021c97bcd77ca4fb7a48c5a7d029a68e2a5b800cd8e553e461b2b7d1f85d7be041422f0b0a4925ee67f6d22f6c3700decb97a094186f4963f0c0188ae0b2d04ecdc74631a6d8ee8b6668fd9058aba53191595b78e3b242c6b054a905f9a84e0d618549407a84ae5af819daa403787eb248b51df5183fa7524523a8e2b7f89852e8227538f6a83bae4a8975c4e50e6d7ede9d86975016ffaf082a937f8aada93072db38ddb644918532b23ea4a0c4a7f1fe6b207ddd818bb2d7d5eda55bc1c650ca10571633691c2127e6ba380000bbebae694e117e81db68af9e8ef3c1988d4d3308e5ac42f35c7da86323bb9dd316aec0d336b34ee597163295ac75ff7ebd280734e6f5a95e202181feaff06cfaf95765f225cda7f230467c7b4311d90179dec080e12e5541577e0e4ab2b8226d3a597a5c3792e395ee4d9699a15e9b93e0ace97828cf755d9dfab455abc865e01f8c0fb6bf12e8d0711a12031cf1f6c22a4ebb81f61b831dcb7803278f9a4266b112a25b78af12d099b4d3571e2b2855258c104589777e974944786f2386a64a55b8e86bebbc0f8caffa0aa7927532bd3f17cca1ee2b83a9b228be5b6abb4f028d4495e218efcde915b459010c4c4b3c54b64f08fd2fe62035a9d5866886efacfcc2ec0f3475ee590f9c500365aac3df8b25da3d1ee013fb64a295e6ff0b5d75a792465c7ebd69fee4f7f2c81ebe2b4ca210e7a8420829d435e5f7fa9c30745abfe61b5b954a2c79dd45a8915b540ebd46b74269cfd14d7c3fd9814afde8a6a11b48a56cdb160ae7bccc0125076476230682d34ad2a50f594d931e3577831f77bfcac683711553d4ce80bf900f70c2b62022a9a673978e8dcbec62d8abec1a9d5054a93c8ecf00d6012c2abbf988f8bd47f255d16682f937be01aba6868b632834f123b1d9a2e6c7fb3a0491f903387699237f2f9c9295fd1716630837eb21d7efd171271ad1dec56f637c676164639e10eecadf2292747c430dce33a610c5caef9d6c6cfe156e8d727acc7d691f7e88ffe5e461472a1e2a085926c5c84ab9315e69c360d56ff613ab6dcc28668ab906a51a6e7e3a3502fa8417a9316cbf83d23ea17b08251f89b5860cbae5a0f7f13bab8af77272c8b4489b052c62ca5b55caa8f520907a4d5328e5ef77103dbe8033ef4f508a181d0a6765642f24e1a5378dd1c7550afe218aa66f7f28cbab7702dca0c6feac781a7473f54f7f6f807b6bbb0d8614ce741a89bfd34768a5ea84ed947b10d48a6ae41158550f76dd731bf53217c14f8d644a17e785549a4c04211e43d41d6a4c804fff84c1b08faf595ee45803a8da3f41846206172a1a7ff92ead4b25ab5367439defa93e738b0c02a4ca14b0b249428e35630d301765ec5fce65eb5700e2f6e47cadb8d1ebeaf0030f6ad440e750d01e57b6ce251300b83bfa08f8492b0bb18b5818a93b69c837e4b68c464b3bfc876e081e17afde18b67eb8fcd8898ea979370c40bf5f5b93226b8fa4eefd97992ce86022c3e5eb09910d8e3be0f082323f718e48b7cb7ad6771b9b3428c636accf48811cee5e582d4ee30cf1da9db96f971227f6c08c667ac4fb20d1c1c3bb2294f7a59452b89ee1dac38e38b1724fefe4a0c297c8985592658d902509dc217db0a175cccd2556357d41e93ffcb5eb0b223374a3647aa48a11d02499de0d9ba0db61d323ce0581409e201b14057bac4f4dd6cf112ef37903c56b14cbfe9fcfe7e1374374f0d5692e8495fa6112070684b0c4886d210edbbdec78c2f79adc7ab1bb98cb44a8f2d67ce3f33c8603f8c017ed62b354cee4881b38a35cd2f8caba5225836a1e880db7d12a9b47549c35151a1f1ae28462257d11bec64383eb75f5fba88fa69ab33a2bd9fc42ea17a3d3e2f9e157068b2a1d0bb1d1dcc6c0994ab3e308ae67a1f42497a33c01d4a1d94334b5e6044a7ca106078a9a0e66de307b18c195b79bdd7ccd474c1abcec5b7c4cbb2e945caced2f57e500ac361959e1a693e06a31f3eb7cb80f65cf240ec415592dac95cdacdc3131547a1723797610c30bf50944bd1b12e4a36f3588d20139a50c4819f6d547191e84f0c01a8bd7228b8f7bc4685f8fe5765b1fed4959a9470f745a51c6489cc9004c46a29f8a2d79d35793e9fadc6ff276a828c20d9605ccb746c7320a985005588185d641d8958aacd2005871c4b96cf9fe07156651a7f7a31d2296c372135dfc98c4d4ce665c044f7f57a9547df0b47a8a6a708d2b2edaeb57ebe0243c5e6c9e241bdd0cadbe588b24b217380ed4b03d1ec4eccce5bf09c555646e61c711dc5eedcf88f28e1bed153fbc23ee22622c7f1ebd08530a3f67be2591f9a2f85a3cd86069b7aa60da5814e5e717f57f70d21b60770e3a71f94964d9d252f87aabb6f78e87806a58378b4b05fcf417ea9b3a8a5fa35e23155314ca33a207313a7ea7795f686a555a94c4f5c7a03fbe8a2700b7005eb44f523c49727b731c86ff28273a08c0ad7e6f6285698c24fbc79215c11f36ca878cde87e364df79c65d9e41ea9600baf8e7a7751367582228062e6655879920a5f156dd1037fc1fd72883f3ade6fcc47329325047c78afe59da3763e9c62a1c59ce3078640bd3301c31c19efe903776e23285c50b559d1283ab68e551421b070f1992b0b619a21114ca8ddcb939595668489edd89c4187be7d880501e942f186bcf462b50022f5fd606738487a990dd834cd6f5b45cb9cd219f3cab9468b15daca2c203ae3a0dc63e1d80aa8dddcc3253d5fb0b44fc47e281b9996ed04d9bca88550c327ac000eb003f948ba14214f9b1c50245cf2c8bc95aa30eb64beec57a2457b1d6e07f235bfdecacba7fe5b8ac94cea834e3dd53e5a510717ce0379fd7e5bc4384bbb31522f2a8a4c447169a4ded0003ef4bee59e9bd8478b0268d053643cbe8e01a20af7218fe4d4885da78593a30c87969a0b2c08837b768690805ea0dccd27a5fbb21dcc5a1760163360ccdbce4fca94cbb9fbc2bf9a1b414a7b9fa847938527d521ccf1d1cfc6e3ed3c8f249e7af1c5d891afa83d984f9d5b8406ebdb9f09680a7e7ae3e5aecdd4cb65804e6d12c4b7ad059d8b453f627fe1213016baf7ab0e10b489af15dfda94ab9838e6959601b8fd3ed25ff4cf231e8aba2b8fe399505d09961b64348cb75ccbe1d23bc1770fa47ba7c24da23a2c00abfff1d4cbb046904f4be846b52fe4a8eac587d24853209eac6663a517c5c7fd5e05cc7e706c7f299bcb0a5dd20bc28746ebe20423df4ced0c0af0a39dc43de4ea6baf970025417b97f91611af803202a85f5708c9d5facd5e1c0ef30a3264d0085382da98d6d12ebe414cf47885fdea271c9b3697d2e58e3ebe01ca357b738209a0094599a6bdf0e2b35651ac93a8b4a1462b2e12bee4cb9d57445d64c8351f5d7f36de3a0c5c053", 0x1000, 0x9}, {&(0x7f00000001c0)="e0d27cb398f009385d0ba6418875bdd6a377d2b1d3174a90564e00760a75f1f5b83689f633f17586057e1ecc455a434feb", 0x31, 0x5}, {&(0x7f0000000200)="3431e401ef8c28ac6a41020a019c161ec9e815498fc499", 0x17, 0x5}, {&(0x7f0000001480)="42c1fc", 0x3, 0x4}], 0x204050, &(0x7f0000001580)='GPL.+nodev/*system#/cgroupGPL\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f00000015c0)='./file0\x00'}, 0x10) [ 1450.390143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.395690] ? security_file_ioctl+0x94/0xc0 [ 1450.400138] ksys_ioctl+0xa9/0xd0 [ 1450.403639] __x64_sys_ioctl+0x73/0xb0 [ 1450.407560] do_syscall_64+0x1b9/0x820 [ 1450.411463] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1450.416845] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1450.421788] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1450.426650] ? trace_hardirqs_on_caller+0x310/0x310 [ 1450.431679] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1450.436708] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1450.441744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1450.446620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.451830] RIP: 0033:0x457759 [ 1450.455052] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1450.473998] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1450.481727] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1450.488997] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1450.496266] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1450.503548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1450.510810] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000000)=@ax25={{0x3, @netrom}, [@null, @null, @rose, @netrom, @null, @remote, @rose, @netrom]}, &(0x7f0000000080)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fstatfs(r1, &(0x7f00000000c0)=""/93) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x9, 0x0, 0x0) 02:17:50 executing program 4 (fault-call:10 fault-nth:32): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x4002, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x14, 0x0, 0x0) 02:17:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1450.676331] FAULT_INJECTION: forcing a failure. [ 1450.676331] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.735493] CPU: 0 PID: 1179 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1450.742449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.751805] Call Trace: [ 1450.754412] dump_stack+0x1d3/0x2c6 [ 1450.758087] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1450.763288] ? find_held_lock+0x36/0x1c0 [ 1450.767390] should_fail.cold.4+0xa/0x17 [ 1450.771467] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1450.776604] ? trace_hardirqs_on+0xbd/0x310 [ 1450.780946] ? kasan_check_read+0x11/0x20 [ 1450.785097] ? __debug_object_init+0x57d/0x1290 [ 1450.789792] ? graph_lock+0x270/0x270 [ 1450.793597] ? kasan_check_write+0x14/0x20 [ 1450.797838] ? graph_lock+0x270/0x270 [ 1450.801651] ? __lock_is_held+0xb5/0x140 [ 1450.805716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.811260] ? ___might_sleep+0x1ed/0x300 [ 1450.815426] ? arch_local_save_flags+0x40/0x40 [ 1450.820009] ? blk_mq_realloc_hw_ctxs+0x590/0x12a0 [ 1450.824962] __should_failslab+0x124/0x180 [ 1450.829219] should_failslab+0x9/0x14 [ 1450.833040] kmem_cache_alloc_node_trace+0x270/0x740 [ 1450.838162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.843701] ? check_preemption_disabled+0x48/0x280 [ 1450.848723] __kmalloc_node+0x3c/0x70 [ 1450.852524] blk_mq_realloc_hw_ctxs+0x62c/0x12a0 [ 1450.857321] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1450.862714] ? __lock_is_held+0xb5/0x140 [ 1450.866804] ? __kmalloc_node+0x3c/0x70 [ 1450.870784] ? __kmalloc_node+0x3c/0x70 [ 1450.874771] ? rcu_read_lock_sched_held+0x108/0x120 [ 1450.879798] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1450.885084] ? kasan_unpoison_shadow+0x35/0x50 [ 1450.889673] ? kasan_kmalloc+0xc7/0xe0 [ 1450.893596] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1450.898806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.904352] ? blk_alloc_queue_node+0x988/0xe80 [ 1450.909044] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1450.913563] ? __mutex_init+0x1f7/0x290 [ 1450.917572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.923117] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1450.927895] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1450.933104] blk_mq_init_queue+0x63/0xb0 [ 1450.937175] loop_add+0x376/0xa40 [ 1450.940662] ? loop_queue_rq+0x690/0x690 [ 1450.944743] loop_control_ioctl+0x199/0x530 [ 1450.949076] ? loop_add+0xa40/0xa40 [ 1450.952723] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1450.957668] ? loop_add+0xa40/0xa40 [ 1450.961306] do_vfs_ioctl+0x1de/0x1790 [ 1450.965225] ? __lock_is_held+0xb5/0x140 [ 1450.969330] ? ioctl_preallocate+0x300/0x300 [ 1450.973757] ? memset+0x31/0x40 [ 1450.977051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1450.982602] ? smack_file_ioctl+0x210/0x3c0 [ 1450.986942] ? fget_raw+0x20/0x20 [ 1450.990404] ? smack_file_lock+0x2e0/0x2e0 [ 1450.994664] ? fput+0x130/0x1a0 [ 1450.997955] ? do_syscall_64+0x9a/0x820 [ 1451.001938] ? do_syscall_64+0x9a/0x820 [ 1451.005928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.011477] ? security_file_ioctl+0x94/0xc0 [ 1451.015900] ksys_ioctl+0xa9/0xd0 [ 1451.019378] __x64_sys_ioctl+0x73/0xb0 [ 1451.023278] do_syscall_64+0x1b9/0x820 [ 1451.027193] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1451.032567] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1451.037506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.042370] ? trace_hardirqs_on_caller+0x310/0x310 [ 1451.047404] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1451.052432] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1451.057466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.062383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.067578] RIP: 0033:0x457759 02:17:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffff91, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1451.070783] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.089695] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1451.097441] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1451.104738] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1451.112010] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1451.119284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1451.126559] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:51 executing program 4 (fault-call:10 fault-nth:33): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1451.185861] QAT: Invalid ioctl [ 1451.197302] QAT: Invalid ioctl 02:17:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x44, 0x3, 0x6}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1451.282936] FAULT_INJECTION: forcing a failure. [ 1451.282936] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.313852] CPU: 1 PID: 1202 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1451.320808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.320818] Call Trace: [ 1451.332760] dump_stack+0x1d3/0x2c6 [ 1451.336406] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1451.341632] ? rcu_softirq_qs+0x20/0x20 [ 1451.345693] should_fail.cold.4+0xa/0x17 [ 1451.349764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1451.354896] ? kernel_text_address+0x79/0xf0 [ 1451.359315] ? __kernel_text_address+0xd/0x40 [ 1451.363816] ? __save_stack_trace+0x8d/0xf0 [ 1451.368162] ? graph_lock+0x270/0x270 [ 1451.371977] ? save_stack+0xa9/0xd0 [ 1451.375612] ? __lock_is_held+0xb5/0x140 [ 1451.379714] ? loop_add+0x376/0xa40 [ 1451.383379] ? ___might_sleep+0x1ed/0x300 [ 1451.387535] ? arch_local_save_flags+0x40/0x40 [ 1451.392141] __should_failslab+0x124/0x180 [ 1451.396394] should_failslab+0x9/0x14 [ 1451.400210] kmem_cache_alloc_node_trace+0x270/0x740 [ 1451.405319] ? __kmalloc_node+0x3c/0x70 [ 1451.409301] ? __kmalloc_node+0x3c/0x70 [ 1451.413299] ? rcu_read_lock_sched_held+0x108/0x120 [ 1451.418333] __kmalloc_node+0x3c/0x70 [ 1451.422154] sbitmap_init_node+0x288/0x440 [ 1451.426437] blk_mq_realloc_hw_ctxs+0x6a5/0x12a0 [ 1451.431211] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1451.436598] ? __lock_is_held+0xb5/0x140 [ 1451.440676] ? __kmalloc_node+0x3c/0x70 [ 1451.444662] ? __kmalloc_node+0x3c/0x70 [ 1451.448648] ? rcu_read_lock_sched_held+0x108/0x120 [ 1451.453677] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1451.458960] ? kasan_unpoison_shadow+0x35/0x50 [ 1451.463576] ? kasan_kmalloc+0xc7/0xe0 [ 1451.467480] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1451.472685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.478232] ? blk_alloc_queue_node+0x988/0xe80 [ 1451.482946] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1451.487480] ? __mutex_init+0x1f7/0x290 [ 1451.491483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.497037] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1451.501829] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1451.507033] blk_mq_init_queue+0x63/0xb0 [ 1451.511110] loop_add+0x376/0xa40 [ 1451.514599] ? loop_queue_rq+0x690/0x690 [ 1451.518683] loop_control_ioctl+0x199/0x530 [ 1451.523033] ? loop_add+0xa40/0xa40 [ 1451.526676] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1451.531619] ? loop_add+0xa40/0xa40 [ 1451.535255] do_vfs_ioctl+0x1de/0x1790 [ 1451.539158] ? __lock_is_held+0xb5/0x140 [ 1451.543234] ? ioctl_preallocate+0x300/0x300 [ 1451.547653] ? memset+0x31/0x40 [ 1451.550947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.556495] ? smack_file_ioctl+0x210/0x3c0 [ 1451.560831] ? fget_raw+0x20/0x20 [ 1451.564293] ? smack_file_lock+0x2e0/0x2e0 [ 1451.568544] ? fput+0x130/0x1a0 [ 1451.571834] ? do_syscall_64+0x9a/0x820 [ 1451.575818] ? do_syscall_64+0x9a/0x820 [ 1451.579809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.585355] ? security_file_ioctl+0x94/0xc0 [ 1451.589790] ksys_ioctl+0xa9/0xd0 [ 1451.593259] __x64_sys_ioctl+0x73/0xb0 [ 1451.597166] do_syscall_64+0x1b9/0x820 [ 1451.601069] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1451.606473] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1451.611439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.616311] ? trace_hardirqs_on_caller+0x310/0x310 [ 1451.621368] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1451.626399] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1451.631441] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.636294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.641496] RIP: 0033:0x457759 [ 1451.644691] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.663614] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1451.671338] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1451.678614] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1451.685886] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1451.693154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1451.700444] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfl\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x6, 0x0, 0x0) 02:17:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x18020000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getgid() r2 = syz_open_dev$radio(&(0x7f0000000600)='/dev/radio#\x00', 0x0, 0x2) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000640)=0x7, &(0x7f0000000680)=0x2) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000480)=[{&(0x7f0000000080)="e3fe76210cb0448f96cfc1974cf50b2c6fab29069d71310d6f6c43f2d8224e3ce842c88122b3580a7b581767a04f2c67db7386fe64abb0c0c4f23297c6b19653a37ca2e5a06201bd5a204ebd92564fcea62075a73c7d9c0932e4d393c40e58b43d2151484c37ce725e8001", 0x6b, 0x1}, {&(0x7f00000001c0)="030e95ff5a10e931e7e2a65097e27a2aec5c4b9333f65ee649b7290af586d4ec8f73a42080ec27c2dc4c1802c9b33e02743dfb676d24a0f9475e0693338e39375c33868f8019d3c3435a0d", 0x4b, 0x1f}, {&(0x7f0000000280)="628cec647ad2abbc0347b008266aa408b458f0e97344365fc92febedb3a4e60fc0d742dd76e1ea2c5978306a71948d649bdabb0cbf041374d561b988b911a703992507aec44e54d49b8bc29a3797bb0c459d2a02afcfc3815b25f5aa36741bff2313395eb9fdc84c6725886b93be5915213caa41186bc149404f6ea8a566d1e15f49b1cd2a8fa26cf21fc96152455c7314d4d5a4b0a50b93cc5a4398162ddec574d0faa76ad912e2db9d0e80703caf0cca776d6997364a98330c181af76e4f98095badff50b1cabb9926a71313f658211b27f9a1", 0xd4, 0x8}, {&(0x7f0000000380)="7c16f90e42a3ea0fd97aa30adae2ed5c3c95277d046d8d0a29da8b5794388b606021b9d5983f1cfce4cf323bacd1431d69285789e81cd8db5cd309a4576c4e1518ed47ce447472cb380db7897e4bce58993cc295e5298815b61da3da27ea34568d10a44dbf31962b7d5daf43dc2eb51bbec8cf54f0b109d20999d04762a860d3df988553a3fadaf9b4b97d37d87546b8700b50c466a4a1dc4566256610d9ab491c73bf2c8a44c0e8c3707871db7a6929dddfdf4c8d6bdfb41b361e0e89d7d51e3f835ef6a002aaa3963bfd9b16bf3c056d9eb39f", 0xd4, 0x7fff}], 0x100000, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',dont_appraise,\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) prctl$PR_GET_NO_NEW_PRIVS(0x27) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\b', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:52 executing program 4 (fault-call:10 fault-nth:34): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 02:17:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x7) [ 1451.852144] FAULT_INJECTION: forcing a failure. [ 1451.852144] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.902903] CPU: 0 PID: 1224 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1451.909848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.919200] Call Trace: [ 1451.921798] dump_stack+0x1d3/0x2c6 [ 1451.925459] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1451.930681] ? is_bpf_text_address+0xd3/0x170 [ 1451.935194] should_fail.cold.4+0xa/0x17 [ 1451.939270] ? __save_stack_trace+0x8d/0xf0 [ 1451.943601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1451.948772] ? save_stack+0xa9/0xd0 [ 1451.952413] ? graph_lock+0x270/0x270 [ 1451.956254] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1451.961568] ? blk_alloc_flush_queue+0x120/0x460 [ 1451.966331] ? blk_mq_realloc_hw_ctxs+0x8c2/0x12a0 [ 1451.971320] ? blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1451.976690] ? blk_mq_init_queue+0x63/0xb0 [ 1451.980940] ? loop_add+0x376/0xa40 [ 1451.984580] ? loop_control_ioctl+0x199/0x530 [ 1451.989088] ? do_vfs_ioctl+0x1de/0x1790 [ 1451.993217] ? ksys_ioctl+0xa9/0xd0 [ 1451.996856] ? __x64_sys_ioctl+0x73/0xb0 [ 1452.000933] ? do_syscall_64+0x1b9/0x820 [ 1452.005004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.010394] ? __save_stack_trace+0x8d/0xf0 [ 1452.014739] ? __lock_is_held+0xb5/0x140 [ 1452.018821] ? ___might_sleep+0x1ed/0x300 [ 1452.022983] ? check_preemption_disabled+0x48/0x280 [ 1452.028013] ? arch_local_save_flags+0x40/0x40 [ 1452.032632] __should_failslab+0x124/0x180 [ 1452.036889] should_failslab+0x9/0x14 [ 1452.040704] kmem_cache_alloc_node_trace+0x270/0x740 [ 1452.045827] ? rcu_read_lock_sched_held+0x108/0x120 [ 1452.050858] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1452.056169] __kmalloc_node+0x3c/0x70 [ 1452.059986] blk_alloc_flush_queue+0x1e5/0x460 [ 1452.064597] ? __kmalloc_node+0x3c/0x70 [ 1452.068603] ? blk_insert_flush+0xb00/0xb00 [ 1452.072944] ? kasan_unpoison_shadow+0x35/0x50 [ 1452.077540] ? kasan_kmalloc+0xc7/0xe0 [ 1452.081449] ? __lockdep_init_map+0x105/0x590 [ 1452.085969] blk_mq_realloc_hw_ctxs+0x8c2/0x12a0 [ 1452.090750] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1452.096145] ? __lock_is_held+0xb5/0x140 [ 1452.100224] ? __kmalloc_node+0x3c/0x70 [ 1452.104224] ? __kmalloc_node+0x3c/0x70 [ 1452.108233] ? rcu_read_lock_sched_held+0x108/0x120 [ 1452.113274] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1452.118564] ? kasan_unpoison_shadow+0x35/0x50 [ 1452.123164] ? kasan_kmalloc+0xc7/0xe0 [ 1452.127071] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1452.132275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.137822] ? blk_alloc_queue_node+0x988/0xe80 [ 1452.142511] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1452.147017] ? __mutex_init+0x1f7/0x290 [ 1452.151029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.156575] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1452.161369] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1452.166592] blk_mq_init_queue+0x63/0xb0 [ 1452.170672] loop_add+0x376/0xa40 [ 1452.174141] ? loop_queue_rq+0x690/0x690 [ 1452.178228] loop_control_ioctl+0x199/0x530 [ 1452.182560] ? loop_add+0xa40/0xa40 [ 1452.186208] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1452.191152] ? loop_add+0xa40/0xa40 [ 1452.194794] do_vfs_ioctl+0x1de/0x1790 [ 1452.198711] ? __lock_is_held+0xb5/0x140 [ 1452.202788] ? ioctl_preallocate+0x300/0x300 [ 1452.207210] ? memset+0x31/0x40 [ 1452.210506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.216070] ? smack_file_ioctl+0x210/0x3c0 [ 1452.220432] ? fget_raw+0x20/0x20 [ 1452.223894] ? smack_file_lock+0x2e0/0x2e0 [ 1452.228144] ? fput+0x130/0x1a0 [ 1452.231453] ? do_syscall_64+0x9a/0x820 [ 1452.235440] ? do_syscall_64+0x9a/0x820 [ 1452.239427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.244970] ? security_file_ioctl+0x94/0xc0 [ 1452.249402] ksys_ioctl+0xa9/0xd0 [ 1452.252877] __x64_sys_ioctl+0x73/0xb0 [ 1452.256780] do_syscall_64+0x1b9/0x820 [ 1452.260684] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1452.266061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1452.271001] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.275872] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.280907] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.285937] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1452.290971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.295848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.301045] RIP: 0033:0x457759 [ 1452.304248] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.323154] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1452.330871] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1452.338151] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1452.345425] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:17:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x20000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1452.352698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1452.359972] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:52 executing program 4 (fault-call:10 fault-nth:35): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x4800) 02:17:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xa8bc000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x800, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400009) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1452.575539] FAULT_INJECTION: forcing a failure. [ 1452.575539] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.606388] CPU: 1 PID: 1249 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1452.613356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.622725] Call Trace: 02:17:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "2a580b601bfd58f2bab1437794ef857d"}, 0x11, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1452.625321] dump_stack+0x1d3/0x2c6 [ 1452.628971] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1452.634173] ? is_bpf_text_address+0xd3/0x170 [ 1452.638695] should_fail.cold.4+0xa/0x17 [ 1452.642793] ? __save_stack_trace+0x8d/0xf0 [ 1452.647157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1452.652532] ? save_stack+0xa9/0xd0 [ 1452.656168] ? graph_lock+0x270/0x270 [ 1452.659978] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1452.665277] ? blk_alloc_flush_queue+0x120/0x460 [ 1452.670055] ? blk_mq_realloc_hw_ctxs+0x8c2/0x12a0 02:17:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000001c00)=ANY=[@ANYBLOB="206465762f37001000"], &(0x7f0000004740)='./file0\x00', &(0x7f0000004780)='rootfs\x00', 0x2050420, &(0x7f00000047c0)='(\xa8posix_acl_access!eth1/md5sum\x00') recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/100, 0x64}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f0000000280)=""/207, 0xcf}], 0x4, &(0x7f00000003c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f00000013c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001440)=""/76, 0x4c}, {&(0x7f00000014c0)=""/81, 0x51}], 0x2, &(0x7f0000001580)=""/254, 0xfe}, 0x3d}, {{&(0x7f0000001680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001700)=""/210, 0xd2}, {&(0x7f0000001800)=""/245, 0xf5}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f00000019c0)=""/196, 0xc4}], 0x4, &(0x7f0000001b00)=""/17, 0x11}}, {{&(0x7f0000001b40)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001bc0)=""/18, 0x12}, {&(0x7f0000001c00)}], 0x2, &(0x7f0000001c80)=""/6, 0x6}, 0xfffffffffffffff9}, {{&(0x7f0000001cc0)=@alg, 0x80, &(0x7f0000003240)=[{&(0x7f0000001d40)=""/53, 0x35}, {&(0x7f0000001d80)=""/248, 0xf8}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/88, 0x58}, {&(0x7f0000002f00)=""/120, 0x78}, {&(0x7f0000002f80)=""/43, 0x2b}, {&(0x7f0000002fc0)=""/161, 0xa1}, {&(0x7f0000003080)=""/83, 0x53}, {&(0x7f0000003100)=""/252, 0xfc}, {&(0x7f0000003200)=""/20, 0x14}], 0xa}, 0x200}, {{&(0x7f0000003300)=@caif=@rfm, 0x80, &(0x7f00000043c0)=[{&(0x7f0000003380)=""/4096, 0x1000}, {&(0x7f0000004380)=""/53, 0x35}], 0x2, &(0x7f0000004400)=""/217, 0xd9}, 0x10000}], 0x6, 0x10000, &(0x7f0000004680)) lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000004800)=@md5={0x1, "f472e2c3466933de52dba4d955ad9fde"}, 0x11, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000004840)=ANY=[@ANYBLOB="7b4eaaab2f21d13c1de8382b1ce5778f5d8926d8f59bf4ef62c0c13355c625b1547581bb418b1ba5f3bdda33f810adbf7a0c1a65e87f540b00bbec7fc7f67b5a985e8fc796b829de47666608b22b50a5f9374e7416fa920fae5cc9a62997230ee46f719aaa0f5274e2bb00c0675f41de611089f12c5ed0277f367b6396994464c212966312dd3f4fb095e7512ec4d54f42ce41e0decd59ac548247611657b4ea517fdbd42df7260197beb5a0f31560b937f87a162f77062124e4f13ef546ec98217a9caa47e4f0feefeb06b56f45dfa269adc99d8495c8aaea91148a4c2c9e29db07d0965665c923dcc86daea576adc85bc3d46e3f4fe38fe4ba7438b2", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000004700)=0x14) [ 1452.674990] ? blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1452.680373] ? blk_mq_init_queue+0x63/0xb0 [ 1452.684618] ? loop_add+0x376/0xa40 [ 1452.688250] ? loop_control_ioctl+0x199/0x530 [ 1452.692768] ? do_vfs_ioctl+0x1de/0x1790 [ 1452.696868] ? ksys_ioctl+0xa9/0xd0 [ 1452.700502] ? __x64_sys_ioctl+0x73/0xb0 [ 1452.704587] ? do_syscall_64+0x1b9/0x820 [ 1452.708656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.714053] ? __save_stack_trace+0x8d/0xf0 [ 1452.718398] ? __lock_is_held+0xb5/0x140 [ 1452.722482] ? ___might_sleep+0x1ed/0x300 [ 1452.726635] ? check_preemption_disabled+0x48/0x280 [ 1452.731659] ? arch_local_save_flags+0x40/0x40 [ 1452.736255] __should_failslab+0x124/0x180 [ 1452.740501] should_failslab+0x9/0x14 [ 1452.744307] kmem_cache_alloc_node_trace+0x270/0x740 [ 1452.749447] ? rcu_read_lock_sched_held+0x108/0x120 [ 1452.754485] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1452.759773] __kmalloc_node+0x3c/0x70 [ 1452.763577] blk_alloc_flush_queue+0x1e5/0x460 [ 1452.768183] ? __kmalloc_node+0x3c/0x70 [ 1452.772165] ? blk_insert_flush+0xb00/0xb00 [ 1452.776495] ? kasan_unpoison_shadow+0x35/0x50 [ 1452.781085] ? kasan_kmalloc+0xc7/0xe0 [ 1452.784995] ? __lockdep_init_map+0x105/0x590 [ 1452.789521] blk_mq_realloc_hw_ctxs+0x8c2/0x12a0 [ 1452.794303] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1452.799675] ? __lock_is_held+0xb5/0x140 [ 1452.803757] ? __kmalloc_node+0x3c/0x70 [ 1452.807734] ? __kmalloc_node+0x3c/0x70 [ 1452.811716] ? rcu_read_lock_sched_held+0x108/0x120 [ 1452.816772] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1452.822053] ? kasan_unpoison_shadow+0x35/0x50 [ 1452.826648] ? kasan_kmalloc+0xc7/0xe0 [ 1452.830545] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1452.835783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.841337] ? blk_alloc_queue_node+0x988/0xe80 [ 1452.846031] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1452.850539] ? __mutex_init+0x1f7/0x290 [ 1452.854530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.860066] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1452.864838] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1452.870039] blk_mq_init_queue+0x63/0xb0 [ 1452.874104] loop_add+0x376/0xa40 [ 1452.877568] ? loop_queue_rq+0x690/0x690 [ 1452.881643] loop_control_ioctl+0x199/0x530 [ 1452.885973] ? loop_add+0xa40/0xa40 [ 1452.889610] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1452.894547] ? loop_add+0xa40/0xa40 [ 1452.898176] do_vfs_ioctl+0x1de/0x1790 [ 1452.902081] ? __lock_is_held+0xb5/0x140 [ 1452.906152] ? ioctl_preallocate+0x300/0x300 [ 1452.910565] ? memset+0x31/0x40 [ 1452.913852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.919397] ? smack_file_ioctl+0x210/0x3c0 [ 1452.923719] ? fget_raw+0x20/0x20 [ 1452.927173] ? smack_file_lock+0x2e0/0x2e0 [ 1452.931419] ? fput+0x130/0x1a0 [ 1452.934700] ? do_syscall_64+0x9a/0x820 [ 1452.938676] ? do_syscall_64+0x9a/0x820 [ 1452.942660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.948200] ? security_file_ioctl+0x94/0xc0 [ 1452.952616] ksys_ioctl+0xa9/0xd0 [ 1452.956100] __x64_sys_ioctl+0x73/0xb0 [ 1452.959999] do_syscall_64+0x1b9/0x820 [ 1452.964391] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1452.969769] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1452.974701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.979548] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.984567] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.989591] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1452.994614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.999957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.005150] RIP: 0033:0x457759 [ 1453.008352] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:17:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x1000000) [ 1453.027265] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1453.034973] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1453.042243] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1453.049511] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1453.056779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1453.064080] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:53 executing program 4 (fault-call:10 fault-nth:36): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x48000000) 02:17:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x80040000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x10) 02:17:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x4800, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1453.406125] FAULT_INJECTION: forcing a failure. [ 1453.406125] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.461794] CPU: 0 PID: 1290 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1453.468739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.478093] Call Trace: [ 1453.480686] dump_stack+0x1d3/0x2c6 [ 1453.484337] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1453.489556] should_fail.cold.4+0xa/0x17 [ 1453.493629] ? check_preemption_disabled+0x48/0x280 [ 1453.498694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1453.503811] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1453.508743] ? kasan_check_read+0x11/0x20 [ 1453.512925] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1453.518290] ? rcu_softirq_qs+0x20/0x20 [ 1453.522303] ? unwind_dump+0x190/0x190 [ 1453.526228] ? graph_lock+0x270/0x270 [ 1453.530054] ? is_bpf_text_address+0xd3/0x170 [ 1453.534561] ? find_held_lock+0x36/0x1c0 [ 1453.538642] ? __lock_is_held+0xb5/0x140 [ 1453.542721] ? ___might_sleep+0x1ed/0x300 [ 1453.546870] ? save_stack+0xa9/0xd0 [ 1453.550520] ? arch_local_save_flags+0x40/0x40 [ 1453.555104] ? save_stack+0x43/0xd0 [ 1453.558747] ? kasan_kmalloc+0xc7/0xe0 [ 1453.562669] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1453.567982] ? blk_mq_init_tags+0x79/0x2b0 [ 1453.572225] ? elevator_init_mq+0xd7/0x160 [ 1453.576462] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1453.581919] __should_failslab+0x124/0x180 [ 1453.586156] should_failslab+0x9/0x14 [ 1453.589963] kmem_cache_alloc_node_trace+0x270/0x740 [ 1453.595116] __kmalloc_node+0x3c/0x70 [ 1453.598928] sbitmap_init_node+0x288/0x440 [ 1453.603179] sbitmap_queue_init_node+0xb2/0x850 [ 1453.607858] ? __lock_is_held+0xb5/0x140 [ 1453.611936] ? sbitmap_init_node+0x440/0x440 [ 1453.616344] ? blk_mq_init_tags+0x79/0x2b0 [ 1453.620598] ? rcu_read_lock_sched_held+0x108/0x120 [ 1453.625632] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1453.630916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1453.636475] ? find_next_bit+0x104/0x130 [ 1453.640550] blk_mq_init_tags+0x116/0x2b0 [ 1453.644711] blk_mq_alloc_rq_map+0x9f/0x220 [ 1453.649039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.654635] blk_mq_init_sched+0x21d/0x770 [ 1453.658892] elevator_init_mq+0xd7/0x160 [ 1453.662993] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1453.668316] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1453.672850] ? __mutex_init+0x1f7/0x290 [ 1453.676869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.682447] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1453.687244] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1453.692472] blk_mq_init_queue+0x63/0xb0 [ 1453.696548] loop_add+0x376/0xa40 [ 1453.700026] ? loop_queue_rq+0x690/0x690 [ 1453.704117] loop_control_ioctl+0x199/0x530 [ 1453.708448] ? loop_add+0xa40/0xa40 [ 1453.712089] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1453.717071] ? loop_add+0xa40/0xa40 [ 1453.720708] do_vfs_ioctl+0x1de/0x1790 [ 1453.724605] ? __lock_is_held+0xb5/0x140 [ 1453.728684] ? ioctl_preallocate+0x300/0x300 [ 1453.733113] ? memset+0x31/0x40 [ 1453.736402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.741980] ? smack_file_ioctl+0x210/0x3c0 [ 1453.746323] ? fget_raw+0x20/0x20 [ 1453.749778] ? smack_file_lock+0x2e0/0x2e0 [ 1453.754056] ? fput+0x130/0x1a0 [ 1453.757379] ? do_syscall_64+0x9a/0x820 [ 1453.761368] ? do_syscall_64+0x9a/0x820 [ 1453.765424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.770965] ? security_file_ioctl+0x94/0xc0 [ 1453.775403] ksys_ioctl+0xa9/0xd0 [ 1453.778871] __x64_sys_ioctl+0x73/0xb0 [ 1453.782766] do_syscall_64+0x1b9/0x820 [ 1453.786661] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1453.792035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1453.796971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.801829] ? trace_hardirqs_on_caller+0x310/0x310 [ 1453.806857] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1453.811885] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1453.816926] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.821791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.826989] RIP: 0033:0x457759 [ 1453.830180] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.849264] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:17:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x7000000) 02:17:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00'}, 0x25) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f00000000c0)="ce77eb77bd954151dad1a102e201bb3ceaf6009f212dc5399666eb3b693d6f3e772a63838a48360d9c7d5f268e07ccf7c58d36d256f212d250cf2ad8c916dcde96a816f84eb6298737666cc24e73c49655dd177cd73d0253351bc4d63523b5c2a3ec29f57dc7505437752fcbb5eb68cf4fd7cb3bdc94f6810b6ab962b2cd437b0c5f141fa5a63164850e6c208be9929bc7c8629142768ca30ab86d65077c3dfe08a1dbc05ed5") [ 1453.856972] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1453.864238] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1453.871504] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1453.878770] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1453.886050] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:54 executing program 4 (fault-call:10 fault-nth:37): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9739) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x700) 02:17:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x800000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1454.063315] FAULT_INJECTION: forcing a failure. [ 1454.063315] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.116354] CPU: 0 PID: 1324 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1454.123317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.132674] Call Trace: [ 1454.135276] dump_stack+0x1d3/0x2c6 [ 1454.138942] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.144174] should_fail.cold.4+0xa/0x17 [ 1454.148248] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.153386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1454.158936] ? graph_lock+0x270/0x270 [ 1454.162759] ? find_held_lock+0x36/0x1c0 [ 1454.166834] ? __lock_is_held+0xb5/0x140 [ 1454.170913] ? ___might_sleep+0x1ed/0x300 [ 1454.175070] ? arch_local_save_flags+0x40/0x40 [ 1454.179662] ? __kmalloc_node+0x3c/0x70 [ 1454.183649] ? __kmalloc_node+0x3c/0x70 [ 1454.187654] __should_failslab+0x124/0x180 [ 1454.191918] should_failslab+0x9/0x14 [ 1454.195733] kmem_cache_alloc_node_trace+0x270/0x740 [ 1454.200850] ? check_preemption_disabled+0x48/0x280 [ 1454.205880] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1454.210927] ? find_next_bit+0x104/0x130 [ 1454.215006] sbitmap_queue_init_node+0x34d/0x850 [ 1454.219771] ? __lock_is_held+0xb5/0x140 [ 1454.223862] ? sbitmap_init_node+0x440/0x440 [ 1454.228280] ? blk_mq_init_tags+0x79/0x2b0 [ 1454.232564] ? rcu_read_lock_sched_held+0x108/0x120 [ 1454.237592] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1454.242888] ? find_next_bit+0x104/0x130 [ 1454.246966] blk_mq_init_tags+0x116/0x2b0 [ 1454.251130] blk_mq_alloc_rq_map+0x9f/0x220 [ 1454.255485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.261067] blk_mq_init_sched+0x21d/0x770 [ 1454.265338] elevator_init_mq+0xd7/0x160 [ 1454.269442] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1454.274734] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1454.279234] ? __mutex_init+0x1f7/0x290 [ 1454.283231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.288781] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1454.293555] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1454.298758] blk_mq_init_queue+0x63/0xb0 [ 1454.302827] loop_add+0x376/0xa40 [ 1454.306287] ? loop_queue_rq+0x690/0x690 [ 1454.310368] loop_control_ioctl+0x199/0x530 [ 1454.314693] ? loop_add+0xa40/0xa40 [ 1454.318329] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1454.323274] ? loop_add+0xa40/0xa40 [ 1454.326917] do_vfs_ioctl+0x1de/0x1790 [ 1454.330810] ? __lock_is_held+0xb5/0x140 [ 1454.334884] ? ioctl_preallocate+0x300/0x300 [ 1454.339290] ? memset+0x31/0x40 [ 1454.342571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.348134] ? smack_file_ioctl+0x210/0x3c0 [ 1454.352458] ? fget_raw+0x20/0x20 [ 1454.355914] ? smack_file_lock+0x2e0/0x2e0 [ 1454.360164] ? fput+0x130/0x1a0 [ 1454.363448] ? do_syscall_64+0x9a/0x820 [ 1454.367458] ? do_syscall_64+0x9a/0x820 [ 1454.371469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.377009] ? security_file_ioctl+0x94/0xc0 [ 1454.381442] ksys_ioctl+0xa9/0xd0 [ 1454.384904] __x64_sys_ioctl+0x73/0xb0 [ 1454.388804] do_syscall_64+0x1b9/0x820 [ 1454.392692] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1454.398071] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1454.403039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.407890] ? trace_hardirqs_on_caller+0x310/0x310 [ 1454.412915] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1454.417942] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1454.422988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.427845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.433037] RIP: 0033:0x457759 [ 1454.436280] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.455179] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:17:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="700000002400210628bd7000fedbdfc983d0a478f0a27b097dc297aa24970f6ed4ead072215db044b6c564ad7c60229ebb8516f26e4e9c45f6e9f4595f401ab39636934284ef282def217c3ee9d36665133a1487cb0b06f067c278384c08313305cedc20380000000000000000000000"], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x40014) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0x1}) [ 1454.462903] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1454.470179] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1454.477469] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1454.484746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1454.492035] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x48) 02:17:54 executing program 4 (fault-call:10 fault-nth:38): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10000, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000040)=r0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') 02:17:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x7db5da5400000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x7ffffffff000) [ 1454.716188] FAULT_INJECTION: forcing a failure. [ 1454.716188] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.753812] CPU: 0 PID: 1348 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1454.760761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.770163] Call Trace: [ 1454.772777] dump_stack+0x1d3/0x2c6 [ 1454.776417] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.781629] should_fail.cold.4+0xa/0x17 [ 1454.785729] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.790864] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1454.796404] ? graph_lock+0x270/0x270 [ 1454.800216] ? find_held_lock+0x36/0x1c0 [ 1454.804284] ? __lock_is_held+0xb5/0x140 [ 1454.808367] ? ___might_sleep+0x1ed/0x300 [ 1454.812532] ? arch_local_save_flags+0x40/0x40 [ 1454.817118] ? __lockdep_init_map+0x105/0x590 [ 1454.821625] __should_failslab+0x124/0x180 [ 1454.825864] should_failslab+0x9/0x14 [ 1454.829670] kmem_cache_alloc_node_trace+0x270/0x740 [ 1454.834771] ? init_wait_entry+0x1c0/0x1c0 [ 1454.839005] ? check_preemption_disabled+0x48/0x280 [ 1454.844021] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1454.849059] sbitmap_queue_init_node+0x34d/0x850 [ 1454.853812] ? __lock_is_held+0xb5/0x140 [ 1454.857882] ? sbitmap_init_node+0x440/0x440 [ 1454.862321] ? blk_mq_init_tags+0x79/0x2b0 [ 1454.866579] ? rcu_read_lock_sched_held+0x108/0x120 [ 1454.871597] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1454.876921] ? find_next_bit+0x104/0x130 [ 1454.880986] blk_mq_init_tags+0x177/0x2b0 [ 1454.885137] blk_mq_alloc_rq_map+0x9f/0x220 [ 1454.889495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.895054] blk_mq_init_sched+0x21d/0x770 [ 1454.899314] elevator_init_mq+0xd7/0x160 [ 1454.903408] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1454.908708] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1454.913222] ? __mutex_init+0x1f7/0x290 [ 1454.917218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.922799] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1454.927568] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1454.932768] blk_mq_init_queue+0x63/0xb0 [ 1454.936833] loop_add+0x376/0xa40 [ 1454.940289] ? loop_queue_rq+0x690/0x690 [ 1454.944367] loop_control_ioctl+0x199/0x530 [ 1454.948711] ? loop_add+0xa40/0xa40 [ 1454.952347] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1454.957326] ? loop_add+0xa40/0xa40 [ 1454.960982] do_vfs_ioctl+0x1de/0x1790 [ 1454.965003] ? __lock_is_held+0xb5/0x140 [ 1454.969076] ? ioctl_preallocate+0x300/0x300 [ 1454.973488] ? memset+0x31/0x40 [ 1454.976776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.982321] ? smack_file_ioctl+0x210/0x3c0 [ 1454.986655] ? fget_raw+0x20/0x20 [ 1454.990114] ? smack_file_lock+0x2e0/0x2e0 [ 1454.994384] ? fput+0x130/0x1a0 [ 1454.997674] ? do_syscall_64+0x9a/0x820 [ 1455.001660] ? do_syscall_64+0x9a/0x820 [ 1455.005649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.011192] ? security_file_ioctl+0x94/0xc0 [ 1455.015617] ksys_ioctl+0xa9/0xd0 [ 1455.019091] __x64_sys_ioctl+0x73/0xb0 [ 1455.023007] do_syscall_64+0x1b9/0x820 [ 1455.026907] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1455.032296] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1455.037243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.042102] ? trace_hardirqs_on_caller+0x310/0x310 [ 1455.047134] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1455.052181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.057056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.062251] RIP: 0033:0x457759 [ 1455.065454] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.084357] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1455.092077] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1455.099347] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1455.106635] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:17:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000280)='./file0\x00', 0x0, 0x20018}, 0x3a) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000380), &(0x7f00000002c0)=0x30) r4 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r5 = socket(0x1e, 0x4, 0x0) r6 = socket(0x1e, 0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) recvmsg(r6, &(0x7f0000002a00)={&(0x7f00000003c0)=@xdp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0x1, &(0x7f0000002900)=""/213, 0xd5}, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000640)) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r5, &(0x7f0000000a40), 0x8000000000000b0, 0x0) getgid() gettid() open$dir(&(0x7f00000001c0)='./file0/bus/file0/../file0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000300)={0x2, 0xffffffff80000000, 0x7, 0x2, 0x2, 0xffffffff00000001, 0x3a, 0x0, 0x7, 0x8, 0x7ff}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280), 0x13f, 0x100f}}, 0x20) close(r0) ioctl$KDSKBLED(r4, 0x4b65, 0x9) write$binfmt_script(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x179) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000100)=0x1) [ 1455.113906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1455.121177] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:55 executing program 4 (fault-call:10 fault-nth:39): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:55 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) write$P9_RREMOVE(r2, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 02:17:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xe00000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x4800000000000000) [ 1455.279375] FAULT_INJECTION: forcing a failure. [ 1455.279375] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.326561] CPU: 1 PID: 1366 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1455.333502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.342878] Call Trace: [ 1455.345478] dump_stack+0x1d3/0x2c6 [ 1455.349116] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1455.354315] ? blk_mq_init_sched+0x21d/0x770 [ 1455.358725] ? elevator_init_mq+0xd7/0x160 [ 1455.362976] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1455.368450] ? blk_mq_init_queue+0x63/0xb0 [ 1455.372691] ? loop_control_ioctl+0x199/0x530 [ 1455.377209] should_fail.cold.4+0xa/0x17 [ 1455.381279] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1455.386394] ? graph_lock+0x270/0x270 [ 1455.390206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.395765] ? check_preemption_disabled+0x48/0x280 [ 1455.400801] ? graph_lock+0x270/0x270 [ 1455.404608] ? __lock_is_held+0xb5/0x140 [ 1455.408688] ? __lockdep_init_map+0x105/0x590 [ 1455.413199] ? __lock_is_held+0xb5/0x140 [ 1455.417276] ? ___might_sleep+0x1ed/0x300 [ 1455.421434] ? arch_local_save_flags+0x40/0x40 [ 1455.426034] ? sbitmap_queue_init_node+0xce/0x850 [ 1455.430880] ? __lock_is_held+0xb5/0x140 [ 1455.434953] __should_failslab+0x124/0x180 [ 1455.439223] should_failslab+0x9/0x14 [ 1455.443034] kmem_cache_alloc_node_trace+0x270/0x740 [ 1455.448165] ? find_next_bit+0x104/0x130 [ 1455.452245] __kmalloc_node+0x3c/0x70 [ 1455.456057] blk_mq_alloc_rq_map+0xcc/0x220 [ 1455.460395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.465976] blk_mq_init_sched+0x21d/0x770 [ 1455.470237] elevator_init_mq+0xd7/0x160 [ 1455.474313] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1455.479609] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1455.484115] ? __mutex_init+0x1f7/0x290 [ 1455.488151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.493697] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1455.498492] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1455.503715] blk_mq_init_queue+0x63/0xb0 [ 1455.507787] loop_add+0x376/0xa40 [ 1455.511260] ? loop_queue_rq+0x690/0x690 [ 1455.515368] loop_control_ioctl+0x199/0x530 [ 1455.519717] ? loop_add+0xa40/0xa40 [ 1455.523385] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1455.528340] ? loop_add+0xa40/0xa40 [ 1455.531990] do_vfs_ioctl+0x1de/0x1790 [ 1455.535888] ? __lock_is_held+0xb5/0x140 [ 1455.539965] ? ioctl_preallocate+0x300/0x300 [ 1455.544388] ? memset+0x31/0x40 [ 1455.547684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.553236] ? smack_file_ioctl+0x210/0x3c0 [ 1455.557567] ? fget_raw+0x20/0x20 [ 1455.561029] ? smack_file_lock+0x2e0/0x2e0 [ 1455.565281] ? fput+0x130/0x1a0 [ 1455.568572] ? do_syscall_64+0x9a/0x820 [ 1455.572555] ? do_syscall_64+0x9a/0x820 [ 1455.576546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.582108] ? security_file_ioctl+0x94/0xc0 [ 1455.586537] ksys_ioctl+0xa9/0xd0 [ 1455.590008] __x64_sys_ioctl+0x73/0xb0 [ 1455.593914] do_syscall_64+0x1b9/0x820 [ 1455.597830] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1455.603208] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1455.608146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.613049] ? trace_hardirqs_on_caller+0x310/0x310 [ 1455.618073] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1455.623097] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1455.628143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.632999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.638188] RIP: 0033:0x457759 [ 1455.641393] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.660297] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1455.668006] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 02:17:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x8dffffff00000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$nfc_llcp(r0, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4040010}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14010000", @ANYRES16=r3, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x24000001}, 0x4000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 1455.675293] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1455.682574] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1455.689850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1455.697131] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:56 executing program 4 (fault-call:10 fault-nth:40): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xeb', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0xf0ffffff7f0000) 02:17:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x9, 0x4) [ 1455.879209] FAULT_INJECTION: forcing a failure. [ 1455.879209] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.921050] CPU: 1 PID: 1393 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1455.927994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.937351] Call Trace: [ 1455.940040] dump_stack+0x1d3/0x2c6 [ 1455.943681] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1455.948935] should_fail.cold.4+0xa/0x17 [ 1455.953028] ? kernel_text_address+0x79/0xf0 [ 1455.957481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1455.962593] ? unwind_get_return_address+0x61/0xa0 [ 1455.967534] ? __save_stack_trace+0x8d/0xf0 [ 1455.971898] ? graph_lock+0x270/0x270 [ 1455.975725] ? save_stack+0xa9/0xd0 [ 1455.979401] ? save_stack+0x43/0xd0 [ 1455.983094] ? kasan_kmalloc+0xc7/0xe0 [ 1455.986989] ? __kmalloc_node+0x50/0x70 [ 1455.990970] ? blk_mq_alloc_rq_map+0xcc/0x220 [ 1455.995474] ? blk_mq_init_sched+0x21d/0x770 [ 1455.999894] ? elevator_init_mq+0xd7/0x160 [ 1456.004138] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1456.009605] ? __lock_is_held+0xb5/0x140 [ 1456.013732] ? check_preemption_disabled+0x48/0x280 [ 1456.018777] ? ___might_sleep+0x1ed/0x300 [ 1456.022938] ? arch_local_save_flags+0x40/0x40 [ 1456.027529] ? __lock_is_held+0xb5/0x140 [ 1456.031612] __should_failslab+0x124/0x180 [ 1456.035859] should_failslab+0x9/0x14 [ 1456.039673] kmem_cache_alloc_node_trace+0x270/0x740 [ 1456.044817] ? kasan_unpoison_shadow+0x35/0x50 [ 1456.049431] __kmalloc_node+0x3c/0x70 [ 1456.053269] blk_mq_alloc_rq_map+0x10d/0x220 [ 1456.057684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.063244] blk_mq_init_sched+0x21d/0x770 [ 1456.067503] elevator_init_mq+0xd7/0x160 [ 1456.071575] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1456.076889] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1456.081408] ? __mutex_init+0x1f7/0x290 [ 1456.085420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.090981] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1456.095762] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1456.100977] blk_mq_init_queue+0x63/0xb0 [ 1456.105058] loop_add+0x376/0xa40 [ 1456.108529] ? loop_queue_rq+0x690/0x690 [ 1456.112617] loop_control_ioctl+0x199/0x530 [ 1456.116955] ? loop_add+0xa40/0xa40 [ 1456.120620] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1456.125569] ? loop_add+0xa40/0xa40 [ 1456.129211] do_vfs_ioctl+0x1de/0x1790 [ 1456.133113] ? __lock_is_held+0xb5/0x140 [ 1456.137194] ? ioctl_preallocate+0x300/0x300 [ 1456.141613] ? memset+0x31/0x40 [ 1456.144906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.150453] ? smack_file_ioctl+0x210/0x3c0 [ 1456.154785] ? fget_raw+0x20/0x20 [ 1456.158251] ? smack_file_lock+0x2e0/0x2e0 [ 1456.162509] ? fput+0x130/0x1a0 [ 1456.165804] ? do_syscall_64+0x9a/0x820 [ 1456.169792] ? do_syscall_64+0x9a/0x820 [ 1456.173794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.179338] ? security_file_ioctl+0x94/0xc0 [ 1456.183785] ksys_ioctl+0xa9/0xd0 [ 1456.187255] __x64_sys_ioctl+0x73/0xb0 [ 1456.191174] do_syscall_64+0x1b9/0x820 [ 1456.195072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1456.200449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1456.205399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.210256] ? trace_hardirqs_on_caller+0x310/0x310 [ 1456.215280] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1456.220303] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1456.225330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.230209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.235428] RIP: 0033:0x457759 [ 1456.238679] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.257584] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1456.265386] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 02:17:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x10000000000000) [ 1456.272654] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1456.279939] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1456.287213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1456.294483] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto(r0, &(0x7f00000000c0)="e426312ceb655ad896c0db582ec962e73767c4263ffd37abf1451285a6adbe63ce6bcf968630f5f0f454c1f0d034582df7102b2e9465758a46c000ca7b5ac72e4983a9fdc740b710", 0x48, 0x4, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)={0x254, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6b6b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf8f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe174}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @local, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @loopback}}}}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xabc2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff92a80cbe}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x254}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r4 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) r6 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000200)='scalable\x00', 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0xfffffffffffffffd, 0x48040, &(0x7f0000000500)=ANY=[@ANYBLOB='data=writeback,noload,mblk_io_submit,grpjquota=./file0,nomblk_io_submit,bh,norecovery,test_dummy_encryption,block_validity,discard,fowner=', @ANYRESDEC=r4, @ANYBLOB=',appraise,mask=^MAY_WRITE,fsname=-,euid=', @ANYRESDEC=r5, @ANYBLOB="7030400000000000000000000000000000d6314a529ede3b8a01c55920f4fe3d9e7464ef75438061edf5c2e10170418f9d43245162c901c1d4a13026338668a52d95b0d4321ed894c2a0da8e40500955972d23b5ac396e85e1e975d5345d8a3044e190060cb5ac43ef59e1fc2905232f19260810e65d2c71c7d289f50c913791e702ea0a6926723e3a9e6498f682a2e677d2bbcc36ad4cb468143030c7482600"]) 02:17:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xeffdffff, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:56 executing program 4 (fault-call:10 fault-nth:41): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x700000000000000) 02:17:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 02:17:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffff00000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x100000) [ 1456.482340] FAULT_INJECTION: forcing a failure. [ 1456.482340] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.521535] CPU: 1 PID: 1425 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1456.528493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.537852] Call Trace: [ 1456.540459] dump_stack+0x1d3/0x2c6 [ 1456.544102] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1456.549318] should_fail.cold.4+0xa/0x17 [ 1456.553451] ? kernel_text_address+0x79/0xf0 [ 1456.557890] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1456.563006] ? unwind_get_return_address+0x61/0xa0 [ 1456.567956] ? __save_stack_trace+0x8d/0xf0 [ 1456.572300] ? graph_lock+0x270/0x270 [ 1456.576136] ? save_stack+0xa9/0xd0 [ 1456.579790] ? save_stack+0x43/0xd0 [ 1456.583425] ? kasan_kmalloc+0xc7/0xe0 [ 1456.587321] ? __kmalloc_node+0x50/0x70 [ 1456.591301] ? blk_mq_alloc_rq_map+0xcc/0x220 [ 1456.595804] ? blk_mq_init_sched+0x21d/0x770 [ 1456.600227] ? elevator_init_mq+0xd7/0x160 [ 1456.604478] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1456.609950] ? __lock_is_held+0xb5/0x140 [ 1456.614035] ? check_preemption_disabled+0x48/0x280 [ 1456.619129] ? ___might_sleep+0x1ed/0x300 [ 1456.623384] ? arch_local_save_flags+0x40/0x40 [ 1456.627980] ? __lock_is_held+0xb5/0x140 [ 1456.632058] __should_failslab+0x124/0x180 [ 1456.636300] should_failslab+0x9/0x14 [ 1456.640137] kmem_cache_alloc_node_trace+0x270/0x740 [ 1456.645261] ? kasan_unpoison_shadow+0x35/0x50 [ 1456.649860] __kmalloc_node+0x3c/0x70 [ 1456.653672] blk_mq_alloc_rq_map+0x10d/0x220 [ 1456.658128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.663681] blk_mq_init_sched+0x21d/0x770 [ 1456.667938] elevator_init_mq+0xd7/0x160 [ 1456.672010] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1456.677302] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1456.681807] ? __mutex_init+0x1f7/0x290 [ 1456.685815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.691468] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1456.696247] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1456.701470] blk_mq_init_queue+0x63/0xb0 [ 1456.705549] loop_add+0x376/0xa40 [ 1456.709019] ? loop_queue_rq+0x690/0x690 [ 1456.713127] loop_control_ioctl+0x199/0x530 [ 1456.717462] ? loop_add+0xa40/0xa40 [ 1456.721108] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1456.726056] ? loop_add+0xa40/0xa40 [ 1456.729691] do_vfs_ioctl+0x1de/0x1790 [ 1456.733587] ? __lock_is_held+0xb5/0x140 [ 1456.737657] ? ioctl_preallocate+0x300/0x300 [ 1456.742065] ? memset+0x31/0x40 [ 1456.745347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.750893] ? smack_file_ioctl+0x210/0x3c0 [ 1456.755231] ? fget_raw+0x20/0x20 [ 1456.758732] ? smack_file_lock+0x2e0/0x2e0 [ 1456.762987] ? fput+0x130/0x1a0 [ 1456.766264] ? do_syscall_64+0x9a/0x820 [ 1456.770250] ? do_syscall_64+0x9a/0x820 [ 1456.774227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.779763] ? security_file_ioctl+0x94/0xc0 [ 1456.784188] ksys_ioctl+0xa9/0xd0 [ 1456.787645] __x64_sys_ioctl+0x73/0xb0 [ 1456.791532] do_syscall_64+0x1b9/0x820 [ 1456.795416] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1456.800793] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1456.805718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.810558] ? trace_hardirqs_on_caller+0x310/0x310 [ 1456.815602] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1456.820664] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1456.825720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.830571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.835754] RIP: 0033:0x457759 [ 1456.838943] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.857836] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1456.865575] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1456.872838] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 02:17:57 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) [ 1456.880101] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1456.887379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1456.894648] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) syncfs(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x13) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) [ 1457.024746] QAT: Invalid ioctl [ 1457.033935] QAT: Invalid ioctl 02:17:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, 0x0) 02:17:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x700, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:57 executing program 4 (fault-call:10 fault-nth:42): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x80800) syz_mount_image$btrfs(&(0x7f0000000400)='btrfs\x00', &(0x7f0000000440)='./file0\x00', 0x1, 0x2, &(0x7f0000001580)=[{&(0x7f0000000480)="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", 0x1000, 0x7}, {&(0x7f0000001480)="eb88841d9ddd3ae6b305905634b039ba805c4a60eefe30bbc8e83853cbf60bc534b29d836ba1e61bda2dcd952242d5e0500cc6d706cfb7a782dab073c7524f2c0420a5e45c02293ee79a1b5f22aae065874ca1b68cf5c14bbc87494a709d7459b73fc18eeb770f4dd9ecc1964ef6575ce2833f7ece9975f6b9bfadf3eddade72c68f6ca3517f2dc4ee6ae1116130b4c7fa02350084cf564b7e87cc2969480b9c3552ad22f091e0dfd0cacd276ad607b1fd663fa3fb565bcc42c961c4f88d713690fe5e78d48203f79f7eb4a44d91298f836e9830", 0xd4, 0x7f}], 0x40000, &(0x7f00000015c0)=ANY=[@ANYBLOB='acl,check_intommit,flushonyommit,dont_measure,dont_measure,smackfshat=/dev/rtc0\x00,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000016c0)={0x0, 0x0, 0x2080}) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x7c, r3, 0x201, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xcec}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x200}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x40}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff54a}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd5a3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8ac0cd813fd5452f}, 0xc, &(0x7f00000001c0)={&(0x7f0000001640)=ANY=[@ANYBLOB="240000002a0008032dbd7000fddbdf25000000dfaf976dcd8d97d1f4d4b04b4505035e3bc78374c6bd4489246cb687c43f4e898758242c097710cf2f7dfa7c33", @ANYRES32=r2, @ANYBLOB="0000e0ff020008000400ffff"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 02:17:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x1, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000100)={{0x2, 0x1, 0x1ff, 0x0, 0x20, 0xfffffffffffffff9}, 0x2bf7, 0xe8, 0x21, 0x73a, 0x10001, "1111cd0a7176527cb53685c858eaed17deeb62983ce180523aeaf2dc9c5394cbe04dfed6ba850ceea49fcc03a59a1e6b74e7a08690ff5b82b5c3de50d5b2e43ce3d6743d52c6f5e1dd74925e92a63a68434ef6b7679ae014885a0277af31a6296acfcb9ea2bc4cbd416b9c78b0eff6a0979f558d966e1573a36532d9db0a03c6"}) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000200)={0xbb, &(0x7f0000000280)="480c755ae2b9d4b8a8465998e3da259c28179f6f4ad8a9a94a9fc929a50a600cde73bc5716ff6c229b7ec0335af2315902352198803808f718835afdc7c43cdde08e79e26784827433e44b06b95bcb327a6934f12ccd5620ab8a940389d42fd264ad2a92805c8ea57eee18a5d0cdc64f89f94a88be7681f083a948071aaa6a67fa08cd77d825e67597f1045e0b052cf8c83434beec3d1b6b946285086e9e332d3ffe5ed13d2b42da1368af80666e00a420be7453d8b6b4bdff6f58"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) bpf$OBJ_GET_PROG(0x12, 0x0, 0xfffffffffffffe22) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f00000001c0)={0x3, 0x1, [0x4bf, 0x5, 0xa5, 0xffffffff, 0x6, 0x1000000, 0x81, 0x8]}) 02:17:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x3f00, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 02:17:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x12000, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)={0x14, 0x7, 0x1, {{0x7, 'system,'}, 0xea1}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTAT(r1, &(0x7f0000000140)={0x59, 0x7d, 0x2, {0x0, 0x52, 0x4, 0x800, {0x0, 0x0, 0x1}, 0x100000, 0x1, 0x0, 0x3f, 0xc, 'vmnet1system', 0x7, 'system,', 0xb, '/dev/audio\x00', 0x1, ')'}}, 0x59) accept4$unix(r0, 0x0, &(0x7f0000000080), 0x800) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x6, 0x7, 0x9, 0xe7]}) r2 = fcntl$dupfd(r0, 0x3926f25c7a060f5e, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) [ 1457.386726] FAULT_INJECTION: forcing a failure. [ 1457.386726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1457.399715] CPU: 0 PID: 1473 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1457.406663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.406671] Call Trace: [ 1457.406697] dump_stack+0x1d3/0x2c6 [ 1457.406722] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1457.406747] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 1457.406773] should_fail.cold.4+0xa/0x17 [ 1457.406795] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1457.406821] ? graph_lock+0x270/0x270 [ 1457.406839] ? find_held_lock+0x36/0x1c0 [ 1457.406867] ? is_bpf_text_address+0xac/0x170 [ 1457.406888] ? __lock_is_held+0xb5/0x140 [ 1457.406909] ? graph_lock+0x270/0x270 [ 1457.449602] ? check_preemption_disabled+0x48/0x280 [ 1457.449629] ? ___might_sleep+0x1ed/0x300 [ 1457.449647] ? arch_local_save_flags+0x40/0x40 [ 1457.475706] ? __lock_is_held+0xb5/0x140 [ 1457.479805] ? __might_sleep+0x95/0x190 [ 1457.483804] __alloc_pages_nodemask+0x366/0xea0 [ 1457.488492] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 1457.493527] ? save_stack+0xa9/0xd0 [ 1457.497183] ? save_stack+0x43/0xd0 [ 1457.500821] ? kasan_kmalloc+0xc7/0xe0 [ 1457.504721] ? __kmalloc_node+0x50/0x70 [ 1457.508709] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1457.513301] ? blk_mq_init_sched+0x21d/0x770 [ 1457.517724] ? do_vfs_ioctl+0x1de/0x1790 [ 1457.521802] ? memset+0x31/0x40 [ 1457.525122] ? loop_init_request+0x83/0x180 [ 1457.529455] ? loop_info64_from_compat+0x940/0x940 [ 1457.534402] ? __cpu_to_node+0x7d/0xa0 [ 1457.538302] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1457.543161] blk_mq_alloc_rqs+0x31c/0x980 [ 1457.547333] ? blk_mq_alloc_rq_map+0x220/0x220 [ 1457.551950] ? kasan_unpoison_shadow+0x35/0x50 [ 1457.556553] ? __kmalloc_node+0x50/0x70 [ 1457.560546] blk_mq_init_sched+0x279/0x770 [ 1457.564804] elevator_init_mq+0xd7/0x160 [ 1457.568898] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1457.574191] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1457.578701] ? __mutex_init+0x1f7/0x290 [ 1457.582709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.588267] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1457.593062] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1457.598279] blk_mq_init_queue+0x63/0xb0 [ 1457.602350] loop_add+0x376/0xa40 [ 1457.605822] ? loop_queue_rq+0x690/0x690 [ 1457.609904] loop_control_ioctl+0x199/0x530 [ 1457.614235] ? loop_add+0xa40/0xa40 [ 1457.617882] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1457.622833] ? loop_add+0xa40/0xa40 [ 1457.626476] do_vfs_ioctl+0x1de/0x1790 [ 1457.630416] ? __lock_is_held+0xb5/0x140 [ 1457.634494] ? ioctl_preallocate+0x300/0x300 [ 1457.638911] ? memset+0x31/0x40 [ 1457.642219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.647781] ? smack_file_ioctl+0x210/0x3c0 [ 1457.652111] ? fget_raw+0x20/0x20 [ 1457.655595] ? smack_file_lock+0x2e0/0x2e0 [ 1457.659854] ? fput+0x130/0x1a0 [ 1457.663143] ? do_syscall_64+0x9a/0x820 [ 1457.667142] ? do_syscall_64+0x9a/0x820 [ 1457.671129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.676677] ? security_file_ioctl+0x94/0xc0 [ 1457.681104] ksys_ioctl+0xa9/0xd0 [ 1457.684576] __x64_sys_ioctl+0x73/0xb0 [ 1457.688477] do_syscall_64+0x1b9/0x820 [ 1457.692415] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1457.697800] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1457.702739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.707594] ? trace_hardirqs_on_caller+0x310/0x310 [ 1457.712640] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1457.717669] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1457.722707] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.727572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.732770] RIP: 0033:0x457759 [ 1457.735972] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.754882] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1457.762597] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1457.769878] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1457.777155] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:17:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='*security\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000533) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) fcntl$notify(r0, 0x402, 0x8) r2 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f00000000c0)={0x9, 0x5, 0xcb92, 'queue1\x00', 0x6}) [ 1457.784461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1457.791768] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x2000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='vmnet0\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r3, 0x0, 0xd, &(0x7f0000000100)='\x12^em1{vmnet1\x00', r4}, 0x30) 02:17:58 executing program 4 (fault-call:10 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfd\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, 0x0) 02:17:58 executing program 1: r0 = timerfd_create(0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)={0x30, 0x100, "041e561adb9a49e233f2ee3d5c6bc4ab4776d4312883286dad0ba4c39a51ee68f83b81df36d49497"}, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) 02:17:58 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x2) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000003c0)=""/197) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:17:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xf1df5774, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(r1, 0x406, r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) sendfile(r1, r0, 0x0, 0x7) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='auxv\x00') setsockopt$packet_int(r4, 0x107, 0x1a, &(0x7f0000000040)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) [ 1458.051808] FAULT_INJECTION: forcing a failure. [ 1458.051808] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.096058] CPU: 1 PID: 1499 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1458.103022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.112388] Call Trace: [ 1458.114998] dump_stack+0x1d3/0x2c6 [ 1458.118647] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1458.123863] should_fail.cold.4+0xa/0x17 [ 1458.127938] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1458.133056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.138604] ? check_preemption_disabled+0x48/0x280 [ 1458.143645] ? graph_lock+0x270/0x270 [ 1458.147469] ? find_held_lock+0x36/0x1c0 [ 1458.151543] ? __lock_is_held+0xb5/0x140 [ 1458.155625] ? ___might_sleep+0x1ed/0x300 [ 1458.159785] ? arch_local_save_flags+0x40/0x40 [ 1458.164384] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1458.168973] ? blk_mq_init_sched+0x21d/0x770 [ 1458.173399] ? do_vfs_ioctl+0x1de/0x1790 [ 1458.177476] __should_failslab+0x124/0x180 [ 1458.181748] should_failslab+0x9/0x14 [ 1458.185563] kmem_cache_alloc_node_trace+0x270/0x740 [ 1458.190691] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1458.195550] elevator_alloc+0x82/0x1f0 [ 1458.199511] dd_init_queue+0x9c/0x600 [ 1458.203325] ? dd_exit_queue+0x250/0x250 [ 1458.207417] ? kasan_unpoison_shadow+0x35/0x50 [ 1458.212046] ? __kmalloc_node+0x50/0x70 [ 1458.216041] blk_mq_init_sched+0x3b3/0x770 [ 1458.220293] elevator_init_mq+0xd7/0x160 [ 1458.224375] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1458.229671] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1458.234189] ? __mutex_init+0x1f7/0x290 [ 1458.238192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.243751] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1458.248526] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1458.253737] blk_mq_init_queue+0x63/0xb0 [ 1458.257805] loop_add+0x376/0xa40 [ 1458.261288] ? loop_queue_rq+0x690/0x690 [ 1458.265371] loop_control_ioctl+0x199/0x530 [ 1458.269698] ? loop_add+0xa40/0xa40 [ 1458.273331] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1458.278288] ? loop_add+0xa40/0xa40 [ 1458.281950] do_vfs_ioctl+0x1de/0x1790 [ 1458.285844] ? __lock_is_held+0xb5/0x140 [ 1458.289935] ? ioctl_preallocate+0x300/0x300 [ 1458.294346] ? memset+0x31/0x40 [ 1458.297670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.303212] ? smack_file_ioctl+0x210/0x3c0 [ 1458.307555] ? fget_raw+0x20/0x20 [ 1458.311051] ? smack_file_lock+0x2e0/0x2e0 [ 1458.315295] ? fput+0x130/0x1a0 [ 1458.318580] ? do_syscall_64+0x9a/0x820 [ 1458.322557] ? do_syscall_64+0x9a/0x820 [ 1458.326562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.332103] ? security_file_ioctl+0x94/0xc0 [ 1458.336520] ksys_ioctl+0xa9/0xd0 [ 1458.340005] __x64_sys_ioctl+0x73/0xb0 [ 1458.343892] do_syscall_64+0x1b9/0x820 [ 1458.347848] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1458.353218] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1458.358151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1458.363001] ? trace_hardirqs_on_caller+0x310/0x310 [ 1458.368021] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1458.373058] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1458.378131] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1458.382982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.388174] RIP: 0033:0x457759 [ 1458.391404] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.410318] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1458.418068] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1458.425388] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1458.432672] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1458.439953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1458.447220] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x7c, 0x1, 0x8000, "44c07d330a2f7710396da2a25288b37d", "b65b99f6311e4ab51c6a04032a020fbe57176042d08c6998273748a066935e6a935d774854c4de2d20032e5102fb6988995ddb9e253fb34d9f8b8d5153c5d26057fc10efbcf8e87f98ba00ef9c671157eecd5ecabc251486a4049ef943a312b9c8c21e2b0dfc63"}, 0x7c, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setrlimit(0xc00000000000007, &(0x7f00000000c0)) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f00000002c0)={0x4}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/protocols\x00') ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x7f, 0x0, 0x2, 0xa7f}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000300)={0x1, {r6, r7+10000000}, 0x2, 0x8e14}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000200)={0x1, r5}) 02:17:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) 02:17:58 executing program 4 (fault-call:10 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:58 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2, 0x0) write$P9_RAUTH(r0, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x94, 0x4, 0x2}}, 0x14) socketpair$unix(0x1, 0x2000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000080)=""/111) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) accept4$packet(r3, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14, 0x80000) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000c00)={r4, 0x3ff, 0x6, 0xf2, 0x2, 0x1, 0x2d0}) r5 = fcntl$dupfd(r2, 0x0, r1) write$P9_RMKNOD(r5, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x0, 0x0, 0x8}}, 0x14) 02:17:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x91ffffff, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:58 executing program 0: io_setup(0x401, &(0x7f0000000340)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x20d2, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socket$inet6(0xa, 0x3, 0x6) epoll_create(0x18) epoll_create(0x7fffdff9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f000000dff4)) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000003c0)={&(0x7f0000000180), 0x1, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x211}}, 0x4000004) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) write$P9_RXATTRCREATE(r5, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r5, &(0x7f0000000040)={0x7}, 0x7) sendfile(r2, r5, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000380)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$INOTIFY_IOC_SETNEXTWD(r6, 0x40044900, 0x14c20eba) 02:17:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1458.668644] FAULT_INJECTION: forcing a failure. [ 1458.668644] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.717442] CPU: 0 PID: 1524 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1458.724414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.733785] Call Trace: [ 1458.736400] dump_stack+0x1d3/0x2c6 [ 1458.740106] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1458.745318] ? __save_stack_trace+0x8d/0xf0 [ 1458.749661] should_fail.cold.4+0xa/0x17 [ 1458.753737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1458.758869] ? save_stack+0x43/0xd0 [ 1458.762538] ? kasan_kmalloc+0xc7/0xe0 02:17:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x54000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1458.766450] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1458.771743] ? elevator_alloc+0x82/0x1f0 [ 1458.775811] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1458.781261] ? blk_mq_init_queue+0x63/0xb0 [ 1458.785500] ? loop_add+0x376/0xa40 [ 1458.789127] ? loop_control_ioctl+0x199/0x530 [ 1458.793635] ? do_vfs_ioctl+0x1de/0x1790 [ 1458.797701] ? ksys_ioctl+0xa9/0xd0 [ 1458.801342] ? graph_lock+0x270/0x270 [ 1458.805161] ? find_held_lock+0x36/0x1c0 [ 1458.809232] ? find_held_lock+0x36/0x1c0 [ 1458.813300] ? __lock_is_held+0xb5/0x140 [ 1458.817476] ? xfs_bmap_del_extent_delay+0xed8/0x12a0 [ 1458.822731] ? ___might_sleep+0x1ed/0x300 [ 1458.826903] ? arch_local_save_flags+0x40/0x40 [ 1458.831488] ? psi_task_change.cold.11+0x1ac/0x1ac [ 1458.836415] ? kasan_check_write+0x14/0x20 [ 1458.840657] ? kobject_init+0x23d/0x2f0 [ 1458.844705] __should_failslab+0x124/0x180 [ 1458.848947] should_failslab+0x9/0x14 [ 1458.852768] kmem_cache_alloc_node_trace+0x270/0x740 [ 1458.857895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.863441] dd_init_queue+0x10e/0x600 [ 1458.867347] ? dd_exit_queue+0x250/0x250 [ 1458.871470] ? kasan_unpoison_shadow+0x35/0x50 [ 1458.876098] ? __kmalloc_node+0x50/0x70 [ 1458.880101] blk_mq_init_sched+0x3b3/0x770 [ 1458.884351] elevator_init_mq+0xd7/0x160 [ 1458.888427] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1458.893711] ? blk_mq_map_swqueue+0xa50/0xa50 [ 1458.898226] ? __mutex_init+0x1f7/0x290 [ 1458.902228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.907787] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1458.912560] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 1458.917802] blk_mq_init_queue+0x63/0xb0 [ 1458.921874] loop_add+0x376/0xa40 [ 1458.925391] ? loop_queue_rq+0x690/0x690 [ 1458.929502] loop_control_ioctl+0x199/0x530 [ 1458.933829] ? loop_add+0xa40/0xa40 [ 1458.937546] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1458.942555] ? loop_add+0xa40/0xa40 [ 1458.946193] do_vfs_ioctl+0x1de/0x1790 [ 1458.950104] ? __lock_is_held+0xb5/0x140 [ 1458.954172] ? ioctl_preallocate+0x300/0x300 [ 1458.958587] ? memset+0x31/0x40 [ 1458.961885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.967646] ? smack_file_ioctl+0x210/0x3c0 [ 1458.971987] ? fget_raw+0x20/0x20 [ 1458.975457] ? smack_file_lock+0x2e0/0x2e0 [ 1458.979717] ? fput+0x130/0x1a0 [ 1458.983031] ? do_syscall_64+0x9a/0x820 [ 1458.987021] ? do_syscall_64+0x9a/0x820 [ 1458.991048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.996591] ? security_file_ioctl+0x94/0xc0 [ 1459.001042] ksys_ioctl+0xa9/0xd0 [ 1459.004503] __x64_sys_ioctl+0x73/0xb0 [ 1459.008649] do_syscall_64+0x1b9/0x820 [ 1459.012546] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1459.017934] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1459.022889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.027748] ? trace_hardirqs_on_caller+0x310/0x310 [ 1459.032806] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1459.037837] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1459.042902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.047762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.052974] RIP: 0033:0x457759 [ 1459.056192] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1459.075100] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1459.083020] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1459.090294] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1459.097569] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1459.104861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1459.112137] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:17:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 02:17:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x131f, 0x4001) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x5, 0x22, 0x23c, 0x1, 0x1, 0x6, 0x3, 0x0, 0x3ff, 0x10001, 0x200, 0xffffffff7fffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) shutdown(r1, 0x1) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="1b000000ffffff7f9182299e000000000000000000000000000000"], 0x0) 02:17:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfffffdef, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:17:59 executing program 4 (fault-call:10 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:17:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 02:17:59 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0xff}, 0x28, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) 02:17:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1459.406298] FAULT_INJECTION: forcing a failure. [ 1459.406298] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.444905] CPU: 0 PID: 1568 Comm: syz-executor4 Not tainted 4.20.0+ #167 02:17:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffffffe, 0x2280) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000280)={0x9b0000, 0x280, 0x9dde, [], &(0x7f0000000200)={0x0, 0x1000}}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x200, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0xfd0, @bearer=@l2={'eth', 0x3a, '\x00'}}}}, ["", "", "", ""]}, 0x2c}}, 0xc004) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000040)) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) [ 1459.451903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.461255] Call Trace: [ 1459.463852] dump_stack+0x1d3/0x2c6 [ 1459.467505] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1459.472728] should_fail.cold.4+0xa/0x17 [ 1459.476804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1459.481935] ? blk_mq_debugfs_register_sched_hctx+0x14d/0x1b0 [ 1459.487826] ? graph_lock+0x270/0x270 [ 1459.491637] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1459.496665] ? blk_mq_init_sched+0x36a/0x770 [ 1459.501102] ? find_held_lock+0x36/0x1c0 [ 1459.505178] ? __lock_is_held+0xb5/0x140 [ 1459.509261] ? ___might_sleep+0x1ed/0x300 [ 1459.513424] ? arch_local_save_flags+0x40/0x40 [ 1459.518031] ? find_held_lock+0x36/0x1c0 [ 1459.522134] __should_failslab+0x124/0x180 [ 1459.526409] should_failslab+0x9/0x14 [ 1459.530229] kmem_cache_alloc_node_trace+0x270/0x740 [ 1459.535343] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1459.539948] ? trace_hardirqs_on+0xbd/0x310 [ 1459.544276] ? kasan_check_read+0x11/0x20 [ 1459.548441] __alloc_disk_node+0xc9/0x510 [ 1459.552607] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1459.557297] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1459.562414] ? blk_queue_flag_set+0xf6/0x160 [ 1459.566842] loop_add+0x459/0xa40 [ 1459.570309] ? loop_queue_rq+0x690/0x690 [ 1459.574401] loop_control_ioctl+0x199/0x530 [ 1459.578740] ? loop_add+0xa40/0xa40 [ 1459.582393] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1459.587336] ? loop_add+0xa40/0xa40 [ 1459.590987] do_vfs_ioctl+0x1de/0x1790 [ 1459.594902] ? __lock_is_held+0xb5/0x140 [ 1459.598982] ? ioctl_preallocate+0x300/0x300 [ 1459.603406] ? memset+0x31/0x40 [ 1459.606705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.612251] ? smack_file_ioctl+0x210/0x3c0 [ 1459.616589] ? fget_raw+0x20/0x20 [ 1459.620061] ? smack_file_lock+0x2e0/0x2e0 [ 1459.624310] ? fput+0x130/0x1a0 [ 1459.627600] ? do_syscall_64+0x9a/0x820 [ 1459.631587] ? do_syscall_64+0x9a/0x820 [ 1459.635579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.641127] ? security_file_ioctl+0x94/0xc0 [ 1459.645551] ksys_ioctl+0xa9/0xd0 [ 1459.649039] __x64_sys_ioctl+0x73/0xb0 [ 1459.652934] do_syscall_64+0x1b9/0x820 [ 1459.656848] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1459.662227] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1459.667163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.672014] ? trace_hardirqs_on_caller+0x310/0x310 [ 1459.677042] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1459.682067] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1459.687117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.691995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.697237] RIP: 0033:0x457759 [ 1459.700508] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1459.719415] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1459.727169] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1459.734491] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1459.741763] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1459.749035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 02:18:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x1f4, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1459.756305] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:18:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:18:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0) 02:18:00 executing program 4 (fault-call:10 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:18:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x5000000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:18:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="d71ba2f2b3126b1474842090b15a464fe3c52c1bb66898833d8b80eae6418a7cf7ad207d781fed31c8c95a2d38abfb25760e05870d9c263926dd37b45c481d568875", 0x42, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000200)=[{&(0x7f0000000280)="f9b735b529491fd4d87a0bc932f533dc1638d08e34f70e2724c3fb075705e5c5a2c91679e57bf106807d91b7330286a1ebbf45ee21b31c85839ace59e18805cb86c74ea7ad67cd8e201cf7f63550764cf602d3b753abaf035165bc0631c5982747727ad907fa1b89919362f12be38a0b2ea7f4d7151bbe90cfd09358b5e015617ab5b0b23ecb41c348d5689ecc4bfe6153d64069a13a34ae2d5628fe82462ef459cc27a3f206ffa94a22364935658eebb5e3b363b56428f2", 0xb8}, {&(0x7f0000000340)="85558562ededc7fc730098041eadbcd7fba7f6eb05c46390c72e493adce035004b95498a05622faeb28c27187d3e6aa5e07be38429e0c9e26674a6dd868bd0ae5b1e849d16beb04f8e85dcb56d5fc1aa50861724997d13f82865ec7b2ec0de98cd302bbbae8600e213dde2b82c5fc35ad6748276b0990a8a1bcb31baa2aa8e7e5f10814ed8612e248739c4e956d30aff3149bc2649c581bc6ae94de1217ac4bdc6d9908122305064a3f1", 0xaa}], 0x2, r3) 02:18:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1460.089443] FAULT_INJECTION: forcing a failure. [ 1460.089443] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.119690] CPU: 0 PID: 1598 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1460.126641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.135992] Call Trace: [ 1460.138606] dump_stack+0x1d3/0x2c6 [ 1460.142255] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1460.147469] should_fail.cold.4+0xa/0x17 [ 1460.151575] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1460.156709] ? graph_lock+0x270/0x270 [ 1460.160516] ? wait_for_completion+0x8a0/0x8a0 [ 1460.165111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.170667] ? check_preemption_disabled+0x48/0x280 [ 1460.175697] ? graph_lock+0x270/0x270 [ 1460.179520] ? find_held_lock+0x36/0x1c0 [ 1460.183592] ? __lock_is_held+0xb5/0x140 [ 1460.187679] ? ___might_sleep+0x1ed/0x300 [ 1460.191837] ? arch_local_save_flags+0x40/0x40 [ 1460.196465] ? pcpu_balance_workfn+0x1700/0x1700 [ 1460.201235] __should_failslab+0x124/0x180 [ 1460.205479] should_failslab+0x9/0x14 [ 1460.209288] kmem_cache_alloc_node_trace+0x270/0x740 [ 1460.214401] ? lockdep_init_map+0x9/0x10 [ 1460.218504] __kmalloc_node+0x3c/0x70 [ 1460.222328] disk_expand_part_tbl+0x24b/0x3d0 [ 1460.226826] ? blk_free_devt+0x60/0x60 [ 1460.230717] ? trace_hardirqs_on+0xbd/0x310 [ 1460.235044] __alloc_disk_node+0x177/0x510 [ 1460.239308] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1460.244041] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1460.249152] ? blk_queue_flag_set+0xf6/0x160 [ 1460.253567] loop_add+0x459/0xa40 [ 1460.257043] ? loop_queue_rq+0x690/0x690 [ 1460.261137] loop_control_ioctl+0x199/0x530 [ 1460.265491] ? loop_add+0xa40/0xa40 [ 1460.269147] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1460.274106] ? loop_add+0xa40/0xa40 [ 1460.277764] do_vfs_ioctl+0x1de/0x1790 [ 1460.281663] ? __lock_is_held+0xb5/0x140 [ 1460.285777] ? ioctl_preallocate+0x300/0x300 [ 1460.290198] ? memset+0x31/0x40 [ 1460.293494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.299060] ? smack_file_ioctl+0x210/0x3c0 [ 1460.303397] ? fget_raw+0x20/0x20 [ 1460.306860] ? smack_file_lock+0x2e0/0x2e0 [ 1460.311129] ? fput+0x130/0x1a0 [ 1460.314448] ? do_syscall_64+0x9a/0x820 [ 1460.318436] ? do_syscall_64+0x9a/0x820 [ 1460.322422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.327971] ? security_file_ioctl+0x94/0xc0 [ 1460.332406] ksys_ioctl+0xa9/0xd0 [ 1460.335876] __x64_sys_ioctl+0x73/0xb0 [ 1460.339771] do_syscall_64+0x1b9/0x820 [ 1460.343662] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1460.349066] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1460.354049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.358901] ? trace_hardirqs_on_caller+0x310/0x310 [ 1460.363924] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1460.368950] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1460.373973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.378824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.384030] RIP: 0033:0x457759 [ 1460.387259] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.406157] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1460.413882] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1460.421150] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1460.428416] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 02:18:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x8, 0x7fffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x12, 0x0, 0x1c) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x6, 0x1, 0xdd09, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2000000080) 02:18:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair$unix(0x1, 0x839281685b04f583, 0x0, &(0x7f0000000000)) 02:18:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x2000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1460.435679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1460.442946] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:18:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 02:18:00 executing program 4 (fault-call:10 fault-nth:47): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:18:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x200000) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 02:18:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0x9, 0xfffffffffffeffff, 0x9, 0x2000000000, 0x9, 0x96ef}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 02:18:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:18:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0xfffffff5, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:18:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) [ 1460.640672] FAULT_INJECTION: forcing a failure. [ 1460.640672] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.658081] CPU: 0 PID: 1628 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1460.665027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.674380] Call Trace: [ 1460.676985] dump_stack+0x1d3/0x2c6 [ 1460.677011] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1460.677037] ? __lock_is_held+0xb5/0x140 [ 1460.677065] should_fail.cold.4+0xa/0x17 [ 1460.677087] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1460.677119] ? graph_lock+0x270/0x270 [ 1460.677144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.677169] ? find_held_lock+0x36/0x1c0 [ 1460.677196] ? __lock_is_held+0xb5/0x140 [ 1460.716578] ? ___might_sleep+0x1ed/0x300 [ 1460.720728] ? disk_seqf_stop+0xa0/0xa0 [ 1460.724702] ? arch_local_save_flags+0x40/0x40 [ 1460.729282] ? kasan_unpoison_shadow+0x35/0x50 [ 1460.733910] __should_failslab+0x124/0x180 [ 1460.738146] should_failslab+0x9/0x14 [ 1460.741960] kmem_cache_alloc_trace+0x2d7/0x750 [ 1460.746661] ? part_uevent+0x120/0x120 [ 1460.750550] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 1460.755939] ? trace_hardirqs_on+0xbd/0x310 [ 1460.760321] rand_initialize_disk+0x43/0xc0 [ 1460.764667] __alloc_disk_node+0x2ba/0x510 [ 1460.768922] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1460.773595] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1460.778700] ? blk_queue_flag_set+0xf6/0x160 [ 1460.783125] loop_add+0x459/0xa40 [ 1460.786585] ? loop_queue_rq+0x690/0x690 [ 1460.790657] loop_control_ioctl+0x199/0x530 [ 1460.794978] ? loop_add+0xa40/0xa40 [ 1460.798615] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1460.803578] ? loop_add+0xa40/0xa40 [ 1460.807208] do_vfs_ioctl+0x1de/0x1790 [ 1460.811099] ? __lock_is_held+0xb5/0x140 [ 1460.815167] ? ioctl_preallocate+0x300/0x300 [ 1460.819578] ? memset+0x31/0x40 [ 1460.822863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.828420] ? smack_file_ioctl+0x210/0x3c0 [ 1460.832945] ? fget_raw+0x20/0x20 [ 1460.836406] ? smack_file_lock+0x2e0/0x2e0 [ 1460.840652] ? fput+0x130/0x1a0 [ 1460.843940] ? do_syscall_64+0x9a/0x820 [ 1460.847946] ? do_syscall_64+0x9a/0x820 [ 1460.851949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.857490] ? security_file_ioctl+0x94/0xc0 [ 1460.861909] ksys_ioctl+0xa9/0xd0 [ 1460.865392] __x64_sys_ioctl+0x73/0xb0 [ 1460.869283] do_syscall_64+0x1b9/0x820 [ 1460.873172] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1460.878542] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1460.883476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.888323] ? trace_hardirqs_on_caller+0x310/0x310 [ 1460.893346] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1460.898383] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1460.903421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.908295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.913482] RIP: 0033:0x457759 [ 1460.916677] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:18:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x5, &(0x7f00000001c0)=[{&(0x7f0000000080)="a28c885900f79b33e95ac7", 0xb, 0x8}, {&(0x7f00000000c0)="ba9fd1b6", 0x4, 0x10000}, {&(0x7f0000000100)="debd1e49aea52865f5a28afbf06706ca2f5c82d7733e9461fc2a0f74455b319268cf79179e469076ceef89a43e908f4d1a9751e9d32518a18eac1e25936e6b4809af30ee241da84906e0707989495322397aec3620a304fbdb96b0d295e211c892aa9a4620a6f064cf2a68ffc6d73961add7c794640ec12b7acfdc90a515c67a65f9d089d215158d9d3bb35fde0ead650c47295caf4d6f2b3698afa58b64e763df4c33fd86cb", 0xa6, 0x8}, {&(0x7f0000000280)="d4c36cc3df9600130a2d9a42f3cd7b378de14532bd56be420454808209aa9d986f57b005fd69756b78d73e7a67d3c8cbea577f5e8d078720e9f85553572447ee593ee07493339ab79fc3c12e1ec97ce1f51fab03cf338824e53f51552e4970a70c7f8a0f27840859f8c6b26d07ebc389de595050fd99f745c87c3c76bc8610634503050cc83abd2b6b3263c4f499b8d98ea800602124b78a9e5e62aae4e25df45587fc4b9cf53d934c87cae81b8e4d035ccc8f2799cd3d99b8d6d4dc173010dfb13cdcb99dacba9d70", 0xc9, 0xfffffffffffffffe}, {&(0x7f0000000380)="7cd7b0e60c97ed0774dfffa7b54b297b5b013107ab6325dd81fcd13e2f46b9c031a96a7e9ce6902b4042bd66b471201018e606cd9e30640aacc9f28b307f778692899a48d6a433550df9ba9e780231ed55622ca6db844f78ef639efc06305218b807f429d8bbfd0b43b7bd6d9acceb68bd87b640263cdadf03701147f0625ca9d5910d22df1f7f5b67fb", 0x8a, 0x2}], 0x103000, &(0x7f00000004c0)={[{@utf8='utf8'}, {@block={'block', 0x3d, 0x1b4cfe4d6551fdbb}}, {@hide='hide'}, {@nocompress='nocompress'}], [{@fowner_gt={'fowner>', r1}}, {@obj_type={'obj_type', 0x3d, ']selfnodev'}}, {@appraise='appraise'}, {@hash='hash'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x12, 0x0, 0xfffffffffffffdcd) 02:18:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1a0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_rm_watch(r1, r2) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000100), &(0x7f00000001c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000000c0)={0x8000, 0x1, 0x1000, 0x4}, 0x10) [ 1460.935575] RSP: 002b:00007f2c574f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1460.943316] RAX: ffffffffffffffda RBX: 00007f2c574f3c90 RCX: 0000000000457759 [ 1460.950583] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1460.957850] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1460.965307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574f46d4 [ 1460.972572] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 02:18:01 executing program 4 (fault-call:10 fault-nth:48): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) gettid() mount$9p_virtio(0x0, 0x0, 0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:18:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x20, 0x4) 02:18:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 02:18:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x38abda5400000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:18:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000001340)=@xdp, &(0x7f0000000100)=0x80, 0x80800) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000013c0)=@int=0x7, 0x4) r3 = syz_open_dev$vcsa(&(0x7f00000014c0)='/dev/vcsa#\x00', 0x5810d440, 0x101100) ioctl$sock_bt_hci(r3, 0xc00448f3, &(0x7f0000000280)="8fd8954473f80f573b50e374f737db465fe2aade19942b790e0df53086ec03fbb5b9b3d57bc8a240a0c6e84c8d3d555af3a633619437f0c4cf945de2f0dc263d608d5b54278c38c5dc2960c620f8f7c88cf810ec0ab1d96b54d0210853182ff609921237bd11b7799eb29f673047db2ebf239e72165f73b4b7d13c948a9794fc8441866ff8815327e876251688210134316d2bf83a4701e252125946912af5b340fe14b94a22e66e54013dd0bb47c9fc1cac929a0da8aa0ce55ffa1bc4886a02be9c8ae34dba572a6f8ea6ec6a3d9e35c1e19294d1eef1b6dd50fb71f87a3bd4741fcc1689b8478da751270e2a7dd480c25390f44f1435a892d3f76c2dffdfdae84cf07e6c901a865f7b94ef1fb4741b63b4717a7fb52ad3e1cb7eb6f858b1345d302e9d367607061ee1ce5eb8c321fb15d0152649af5934abb5c2e1a7cd4f3353c4d79ae461529a0c5bd3efd2cc7273eacd9b7dd5573cb79f7eeb7afdf96b7a2730a9b7efeeb596cf47a7c6566220c322bc959a5f6ee32fc261ccbc2d5960bad36084b95217be244bdf39a0758f59c2dbb774fc6f5259bda7996aeceba9d54578e692b2a979d72a87b741635a6f72f52679820f4fad52f433597ccd6e84de60cc7b9fb33293ce9d973e81cfb0011216f3549c2082c0e9bdd6168b9497a3ba78210162fd59beab5832d9123ea62dca638ec539cc47cae8c142c6b9ffa30646e0ad6638dfb168d3ba8c36fb9d50ed0582cad600b501929e67a818584947f4652b35f4409e56f6ae42b261da8e70f6d6afb553048a6be331405d16f83dd13eba6ee120928daffa1294ac634c15d65b3219bcfcd8750866a8219856a76f8df7dd014c7f110e75e4ae780782f3e2b1d83fcb5cd20ec34c1a68c3a4c5782db25a5ed57dd691106302af84f6abae5afa82b4546107c218f043db8eb9a8c1297c9bcdba50360b9b89a81736e7085f8be5e272623d88d39c6482e52cfba8c0957b8a657c8739b03f210726f0a6d3c1ac154ab29e846aedb612a547866ed3d30b6745fd965879c395a1d6e8d234fb2c14b598d8ebe54cfa9d455aa1fd6a8c1fa4699be10a61a37e84ef2e393dc3809775466d02638c400145885c74b8198751bf25bbf0c31e55b94d7058bd0ef64e05c287e62a260dc789128d47ad8b92add3d209acca4bcf816a8d43b370d892842423baa6be7dc17214e2a1e4a3a467a3d07a14b6361b66ad7a450522ed089c2c46c624021240b6bdfa90c49fb88f438538eb3b630d9cfc8b70443a532087a5722331f1d35673a692fddbc0bc375b39b98c552849b6071939a1a67a43dee8e98c9894f6ef0fb787ebb3e1f2c55fb6b4d2825d85505c9a92e740c28b1919b573a26e16f79b4d87381dd410ae0437e952738fee05750485ff082340cdd1c99366a774489bc108d84dcc7632e8fa94906b9ee818be8bde50d277ffa3161c8528b5acef7a13dc910784e3b2ce3141236d963f4d06f925cecede2cf333d957f90bf79a5702c037d2e317bb753b0e5a16942482e39c66415e4b2870c4e2d138a0df64a5eb7900d40f5910094db1582b75b29f4b83c82901866ce4fa52c64a759e2fdb634021671a3800f166637cd8a38a9521f5768dbb892e4735f75c508772e16af11d14a9e11213c2f00015dc286c947e9d9db0f56fab4237933920acd6d350e3be86ce62b15b637303f1aea90d2264763f90fc268bd3f05b3798fa28c6a13e6639a8b53436c41cb96da1ab8cdcf3ddbe7aebd020715671cb5eca2e37125d882d9400cd8a71baca668dc1211483a95f823c28d1f1e4687b580e5968ffdaff307b98cb2acefa31ed1bd9a5146326fc4881d175416b04785819413423d3d55731c94057ec6250acc45239cce306d821de67dfcaa6be47bece2a5dda501612f62c4a90519699343e2d4397220d093d72360a6b844a5515e1df71fc8f8d3de09169383237c1ca362c6413ace53fda22be2db8b72c2266dd57dd5756abb3d4d495b281e426b7fd74e5b03c0fbe0ae99834fe7417c4f01d55ac5de3445a8e589098452703c2c16b9c2e2904aaa81bc1917978b8868f00e319e776c9217e37b4ccfa2a01a3855720289d14a6193129bfc77e3182ec7193f19844611844dde6e5dffd7b83319e1cc1f4c7ca185e5ba5eef449b9c1e62055f5d327c1e3a02e689b586291480ed4bcc7e0f3200343c13b5bc539b6e54e1b29af1e57cb7f031967a07d40b1bc24408c3907520090361544d1d80c41833cd046f1d85532c35b5d0cb0d7a2b4440f5313417f4f961bf7d30d3811a68798e979695524128fffbb96c62426c29becb75bfe5d31a6e96355af5dbe7e03feff78803dbaf004fb4340a01819321cca24530e2fe39eaf3bf513cbe6c22eeb2ad603c7c31d3fd330d8acd4a0db223914621a033ef1f265056dec920ce684054be472878aea6c239a0dfefc6f66372fa9531bc7b067fd52e8682f84fb0f5857904cf7191312a957e5499d7582b031a9e922a0001a7503ac0752185aba0e52747c1821e1938c6d37ff5e517e077cc2452c7747b5830750379ac5d54ed775bebdd8d1d90afa489bd14e579c3eea01fc03a0ef8d034f60743a113820afa544945afe2ba8f461fe8f791e5e5b644d572f613ad6840a5ab7aca3bcbf857c7290593624f06ce045f7aafba8a47560d3e83842211f6413476386112e68a4d0faed206f436d62f8c703d689c02a9878823316b0cd3f5764e38e66b457340f23a6f13a1083aaeff9cd77a16cda99d063e2f9b95a35ba279a60f85c6d16c8fbb9dedd4e58447fe7645853d2d1d701fc7acfed77ee3e7e1c3451c116d13747f23ed7912464e861803e2e8ebfdbaa3e13e358d0a50ad87472ae1787f85993f407a75e1be52f1d00e6901e7022618f4bada6b34aa6979b7fdae24c30ba973ba9076d4098f53bfeb30747989defc700bb440c02a470e9bf7b56312a22e5b0776889c5fdb27f2d868c6121f5e8a5d6535616069585420fde2fc9c4b656c55a927cba015341a0e82220f6daff2ede6e875cedee18caf2eb7f33c429a825ebcafeeb66b0bb9822ef286f3a8dc365bb529132810b70772dd12b67adef31cf55d71af63fdc4a5b4057340a109d56bce39878b2921bd47e93ee5493fd023b4dc63788d26ddd9cf49f40f21f3390ef850bec6cd25fc2dd04a0e945fbdbe6c189fabb352cb15a394df076eeb7ff5aee42c5111477e70b5709adef893b6faf21cc3efbd0bd0afaa587bbcfe0dc3b35cc575a28323fc9a8838054f9923804258210d627ce7cddba8d3850f27c0e0665ccb95355a439a576d377c89f8e1a7ab8af96efd7302f403f1c5afb0035b6956944d47acbf915dd0c762e5b6850268d7c97f894ac296cb0d015e7f9be28ff105d51248dc4b8e4fac27d1587cc606ad67ae1506579345daac564d688cbbc593ebe7144f63a219a2951b1b89cc2dfb6738aee37a0cc8ab2e2265005d22bfdd35c0fedc1487335755a8d3479bc7a2eb8146a5402609f58fe2f04ab2db5b8dfc17343fae5486fdcfe3240c5d536c16057327af475963a5411a35aaffd73e457a7f3a3e99813bae6cda4338d4ffebeb6451be3e855f61d46239b8efc9119319978353d27c3391894a121ecf35ee1f18907769c2e29c471f12ef9a785d1d99979799c5c7855e2ad29cbf6ada704268f7098425826e38a8a9c97787c07f8dcb0000f58a9466f719a164313990fc164d475a765acf13c2e0dc001bd3b285c5e796936b6acecb95923f8d613631bbc7e953d02e15d8d0bbbc86dbf513b5b7250857f67b26e18d0176534786aad69d4bf4747138a69e156f46ea2ab60270331e5224f40d86872930ef423a1b977ac9214b05bc7981365b21bdbf0f076adcfd462df9b249213993370e7fc45ec47cf9e1935eba4ea1c68e5af475b43aeeed9e8c45f309ae4f5e0afc7286cd61d13d1dccf9f4b049625723f6f2db125aaef8fcea732c8c6e3719fccee6fcfd83e6f0c8f806dc4977b718aedfac2eb027ebde0939fd410bd9766223915304451f0d7ac26bb1e9455605ee6731017d9db252ffa987b144670f3319aecf59e0284a2cf85b5e765ec70bf7a76846b4257203eb820ca9045b0b1dd32034b65604d89a940bc7d55f1b16d5b39bdc3e128a0d691a09c6caefaa34468ae16e1606002133525b22312df9ffa20620408a8479575b8860765d5f5fddc7ccf3d5c22ee847fb7d7555e993548ddbc6f6106403760d372ce5ea5503caf6c25e938f276d4bfeab2f3c356a1c349719f7464feaca545a60b501e576ad68e29635b605f1fd1e2859460a676aaa315a425d32d817c52da4efd6d18a408cc72a81484e6bbb2a5a20bb3de684b49d5ebdc303874ff6c466dfeddea9dc147602e38da7656d35dd7c01d4344921754ff2b42388cdbb9736a41e7ab9fd4200a12c688f849f7f92ef7e47e0fb37ff856315a6253dc8791093bc29d129e619fe681de21ade63daf9d00e3780d321702bc1a4c274d0b5bc7bd568e46312f129516cf6b4ecad48e9f700bf3968338a4c2fb1f93e69c8f91a16bfdf77a8f3d1e8ed412eff8a466d176a2be8ba80ec7476c394a9d63896d0b6b69e2ef41bbdf33b4d7036cff89a928ba2a390d73378e8add3b8e3f91c9b3f5f4bae49311260d6614dc212afbe0b8447b64e11daf537425de9eb1e9199244b155cdc17d43ac97928b98fae4ed0c97673b75a0f493c6a9ff2d5563930abc79360296a29518b982b2cb2ae4fa7df0ca6ce5e7688c5946ac89b7f633041854435b061ab81a6f0b1c2c5776859a1038183ca3e1e0405efb7c7ca4bf56175dad6a886626df1c8e6e9e82262b1ef73dd3f2a97600d914000d1e2ee20caa18599238d4387288026136edc5b6d6ccd7e48d704570f802a77e1edd55cdb4aa24cbadb0489fb74ae619c67ed11fd6428f8618377c87406d81994a15f206f4c182ae721aea3db8f9dfc9612e92d8b1eafc7a958db970ccb76c9982775d89a58971c838466c09e3ca0f9e13d3fa38d8ded2a83fe0945654bdf7c937d83178f37b1c4b5de5c0edc2fa56d6355bdafbd39c8e66e8d0a0d4435141341a01f62cc1e1d7a05d6d9ea772d6736762254f506a05cfb8f4f46badd6568d480c7cd8548e74569af254c8188a2d0f97aa6403f38d855c6774b5a27bd7fd3dafd0b192d7fa8c29bfe3669ab8f6bc2e3dcb1421847031ff2be194263b0bc9ebd06dd6e9cbfc16fb287648f215bd6ed8f1ebaae075423be3f2cfe90b311032a545a6c8051ab6020e0f706929b8da39e9521ef3fd60df7b331c14a4aa76969bc9f5cd4677275031a4e2629fc886c2020b9438acb4d887d2e33095b0ca873d9b71ecfc78304ef2fe114986f05477c75afe9dc8940d735811d83b9dc7e6dc14d76193d7b896f6586bc56f37d182ff534c3787065567068be373c0b12f5b62ac4ea2649e7dc81446700017d4f43b0ab63293fc144eb6ce2f2ee1614a8528c9e08049abf5ec028adeaa96996be9e926916967b3567290b475b96f375237cf2df9a8dc630cd042a2a5779fefac250a703d5540e947623d2bd1df7a35574aa11058eb50f5e6cb4276e7043cbba41896bcdea1e2a45220a214b0f794ebf2e22dda7e49c71e9e7561d7a8465438352bef26ea2ba1b162d31f7b9f50134728ac0d0a981b98e5cf9a97bcb6f6d8e0879d0bd156b32a37934f6da246486f78d50c15c95fd70318b3668ec1839f2c756869e83c103ffda7dac12f071bcae39eb9cb614d796fd91c7a1e62c11e7ddc85ece5669d27fbf02811a8d86d39e7f2dda6b358c26dd5e682") sendto$unix(r1, &(0x7f0000001280)="8f0b93f01f5d7ef025da69b152d579ff403ee389329f8c88eb84309204cd1c12249227507e11bee7cb163f33dd88bf4dfa4dc27e895aeb3d8eff0da97fd7a3f6f214e6cc52b21a361bac7cb7bc30b00fc56c136be9ee202a74308807918640bbfab8078ee17283a268ef5d05aec8edd8a7c72327da7162f5aa1a08c910f7adc26504c6c75864f9f11f07eeb521ba74add8169a4183980e7d1a69b94170e5c0c822d33737c9efc293dcd1fd6791fc5f749bf96eb585a3", 0xb6, 0x80, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001500)='/dev/snapshot\x00', 0x440000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000001440)={0x101ff, 0x2, 0xd001, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000001480)) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f00000000c0)={r5, &(0x7f0000000080)=""/35}) 02:18:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400000000002) bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000000)=""/180, 0xb4}, {&(0x7f00000000c0)=""/101, 0x65}, {&(0x7f0000000140)=""/136, 0x88}, {&(0x7f0000000200)=""/28, 0x1c}, {&(0x7f0000000280)=""/236, 0xec}], 0x5) 02:18:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x1802000000000000, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:18:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\xf6', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:18:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) [ 1461.340860] FAULT_INJECTION: forcing a failure. [ 1461.340860] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.365403] CPU: 1 PID: 1665 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1461.372360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.381719] Call Trace: [ 1461.384326] dump_stack+0x1d3/0x2c6 [ 1461.387978] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1461.393177] ? pcpu_alloc+0xbce/0x15e0 [ 1461.397095] should_fail.cold.4+0xa/0x17 [ 1461.401175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1461.406290] ? mark_held_locks+0xc7/0x130 [ 1461.410454] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1461.415569] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1461.420690] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1461.425284] ? graph_lock+0x270/0x270 [ 1461.429098] ? trace_hardirqs_on+0xbd/0x310 [ 1461.433439] ? kasan_check_read+0x11/0x20 [ 1461.437602] ? __debug_object_init+0x57d/0x1290 [ 1461.442283] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1461.447751] ? find_held_lock+0x36/0x1c0 [ 1461.451830] ? __lock_is_held+0xb5/0x140 [ 1461.455914] ? ___might_sleep+0x1ed/0x300 [ 1461.460077] ? arch_local_save_flags+0x40/0x40 [ 1461.464677] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1461.469797] ? __debug_object_init+0x57d/0x1290 [ 1461.474484] __should_failslab+0x124/0x180 [ 1461.478735] should_failslab+0x9/0x14 [ 1461.482551] kmem_cache_alloc_trace+0x2d7/0x750 [ 1461.487234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.492786] ? check_preemption_disabled+0x48/0x280 [ 1461.497883] device_create_groups_vargs+0xa7/0x270 [ 1461.502836] device_create_vargs+0x46/0x60 [ 1461.507094] bdi_register_va.part.10+0xc3/0x9c0 [ 1461.511783] ? cgwb_kill+0x640/0x640 [ 1461.515515] ? lockdep_init_map+0x9/0x10 [ 1461.519584] ? __init_waitqueue_head+0x9e/0x150 [ 1461.524264] ? init_wait_entry+0x1c0/0x1c0 [ 1461.528515] ? __lockdep_init_map+0x105/0x590 [ 1461.533060] ? pm_runtime_init+0x476/0x580 [ 1461.537311] ? update_pm_runtime_accounting+0x1b0/0x1b0 [ 1461.542690] bdi_register+0x111/0x130 [ 1461.546505] ? bdi_register_va+0x80/0x80 [ 1461.550595] bdi_register_owner+0x5e/0x100 [ 1461.554849] __device_add_disk+0xebd/0x13e0 [ 1461.559190] ? blk_alloc_devt+0x2e0/0x2e0 [ 1461.563372] ? pointer+0x900/0x900 [ 1461.566927] ? __mutex_init+0x1f7/0x290 [ 1461.570920] ? psi_task_change.cold.11+0x1ac/0x1ac [ 1461.575866] ? sprintf+0xb0/0xe0 [ 1461.579242] ? scnprintf+0x130/0x130 [ 1461.582970] ? __lockdep_init_map+0x105/0x590 [ 1461.587488] device_add_disk+0x2a/0x40 [ 1461.591404] loop_add+0x75b/0xa40 [ 1461.594874] ? loop_queue_rq+0x690/0x690 [ 1461.598960] loop_control_ioctl+0x199/0x530 [ 1461.603297] ? loop_add+0xa40/0xa40 [ 1461.606942] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1461.611890] ? loop_add+0xa40/0xa40 [ 1461.615532] do_vfs_ioctl+0x1de/0x1790 [ 1461.619431] ? __lock_is_held+0xb5/0x140 [ 1461.623512] ? ioctl_preallocate+0x300/0x300 [ 1461.627929] ? memset+0x31/0x40 [ 1461.631222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.636771] ? smack_file_ioctl+0x210/0x3c0 [ 1461.641104] ? fget_raw+0x20/0x20 [ 1461.644578] ? smack_file_lock+0x2e0/0x2e0 [ 1461.648834] ? fput+0x130/0x1a0 [ 1461.652134] ? do_syscall_64+0x9a/0x820 [ 1461.656168] ? do_syscall_64+0x9a/0x820 [ 1461.660160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.665711] ? security_file_ioctl+0x94/0xc0 [ 1461.670140] ksys_ioctl+0xa9/0xd0 [ 1461.673617] __x64_sys_ioctl+0x73/0xb0 [ 1461.677557] do_syscall_64+0x1b9/0x820 [ 1461.681478] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1461.686856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1461.691797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.696657] ? trace_hardirqs_on_caller+0x310/0x310 [ 1461.701684] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1461.706712] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1461.711743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.716610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.721809] RIP: 0033:0x457759 [ 1461.725018] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.743927] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1461.751643] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1461.758914] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1461.766185] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.773477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1461.780773] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1461.791242] WARNING: CPU: 1 PID: 1665 at block/genhd.c:704 __device_add_disk+0x10e6/0x13e0 [ 1461.799661] Kernel panic - not syncing: panic_on_warn set ... [ 1461.805554] CPU: 1 PID: 1665 Comm: syz-executor4 Not tainted 4.20.0+ #167 [ 1461.812511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.821929] Call Trace: [ 1461.824521] dump_stack+0x1d3/0x2c6 [ 1461.828214] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1461.833639] panic+0x2ad/0x55c [ 1461.836870] ? add_taint.cold.5+0x16/0x16 [ 1461.841034] ? __warn.cold.8+0x5/0x45 [ 1461.844847] ? __device_add_disk+0x10e6/0x13e0 [ 1461.849438] __warn.cold.8+0x20/0x45 [ 1461.853159] ? rcu_softirq_qs+0x20/0x20 [ 1461.857145] ? __device_add_disk+0x10e6/0x13e0 [ 1461.861732] report_bug+0x254/0x2d0 [ 1461.865381] do_error_trap+0x11b/0x200 [ 1461.869293] do_invalid_op+0x36/0x40 [ 1461.873011] ? __device_add_disk+0x10e6/0x13e0 [ 1461.877601] invalid_op+0x14/0x20 [ 1461.881066] RIP: 0010:__device_add_disk+0x10e6/0x13e0 [ 1461.886281] Code: 00 80 a3 dc 00 00 00 ef e9 57 f7 ff ff e8 02 18 02 fe 0f 0b e9 cf f7 ff ff e8 f6 17 02 fe 0f 0b e9 eb f6 ff ff e8 ea 17 02 fe <0f> 0b e9 e5 fd ff ff 4c 89 f7 e8 ab 23 45 fe e9 97 f0 ff ff e8 81 [ 1461.905186] RSP: 0018:ffff88817e2d7870 EFLAGS: 00010246 [ 1461.910562] RAX: 0000000000040000 RBX: ffff8881d0871540 RCX: ffffc9000de41000 [ 1461.917864] RDX: 0000000000040000 RSI: ffffffff837c40e6 RDI: 0000000000000005 [ 1461.925142] RBP: ffff88817e2d7a48 R08: ffff88815b9685c0 R09: ffffed103b5e5b8f [ 1461.932417] R10: ffffed103b5e5b8f R11: ffff8881daf2dc7b R12: ffff88817e2d7a20 [ 1461.939696] R13: 00000000fffffff4 R14: ffff8881d0871aa8 R15: ffff8881d0871544 [ 1461.947008] ? __device_add_disk+0x10e6/0x13e0 [ 1461.951612] ? blk_alloc_devt+0x2e0/0x2e0 [ 1461.955795] ? pointer+0x900/0x900 [ 1461.959347] ? __mutex_init+0x1f7/0x290 [ 1461.963359] ? psi_task_change.cold.11+0x1ac/0x1ac [ 1461.968876] ? sprintf+0xb0/0xe0 [ 1461.972250] ? scnprintf+0x130/0x130 [ 1461.975998] ? __lockdep_init_map+0x105/0x590 [ 1461.980513] device_add_disk+0x2a/0x40 [ 1461.984417] loop_add+0x75b/0xa40 [ 1461.987903] ? loop_queue_rq+0x690/0x690 [ 1461.992031] loop_control_ioctl+0x199/0x530 [ 1461.996375] ? loop_add+0xa40/0xa40 [ 1462.000021] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1462.004970] ? loop_add+0xa40/0xa40 [ 1462.008606] do_vfs_ioctl+0x1de/0x1790 [ 1462.012503] ? __lock_is_held+0xb5/0x140 [ 1462.016580] ? ioctl_preallocate+0x300/0x300 [ 1462.021000] ? memset+0x31/0x40 [ 1462.024297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1462.029845] ? smack_file_ioctl+0x210/0x3c0 [ 1462.034175] ? fget_raw+0x20/0x20 [ 1462.037637] ? smack_file_lock+0x2e0/0x2e0 [ 1462.041889] ? fput+0x130/0x1a0 [ 1462.045180] ? do_syscall_64+0x9a/0x820 [ 1462.049166] ? do_syscall_64+0x9a/0x820 [ 1462.053157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1462.058708] ? security_file_ioctl+0x94/0xc0 [ 1462.063141] ksys_ioctl+0xa9/0xd0 [ 1462.066610] __x64_sys_ioctl+0x73/0xb0 [ 1462.070516] do_syscall_64+0x1b9/0x820 [ 1462.074421] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1462.079814] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1462.084754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1462.089615] ? trace_hardirqs_on_caller+0x310/0x310 [ 1462.094650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1462.099679] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1462.104717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1462.109584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1462.114811] RIP: 0033:0x457759 [ 1462.118016] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.136921] RSP: 002b:00007f2c574d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1462.144637] RAX: ffffffffffffffda RBX: 00007f2c574d2c90 RCX: 0000000000457759 [ 1462.151912] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 1462.159189] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1462.166469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c574d36d4 [ 1462.173749] R13: 00000000004c0a32 R14: 00000000004d2268 R15: 0000000000000006 [ 1462.182218] Kernel Offset: disabled [ 1462.185994] Rebooting in 86400 seconds..