Warning: Permanently added '10.128.0.43' (ECDSA) to the list of known hosts. 2019/08/29 09:34:52 fuzzer started syzkaller login: [ 48.098095] kauditd_printk_skb: 3 callbacks suppressed [ 48.098109] audit: type=1400 audit(1567071292.657:36): avc: denied { map } for pid=7592 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/08/29 09:34:55 dialing manager at 10.128.0.105:41769 2019/08/29 09:34:55 syscalls: 2482 2019/08/29 09:34:55 code coverage: enabled 2019/08/29 09:34:55 comparison tracing: enabled 2019/08/29 09:34:55 extra coverage: extra coverage is not supported by the kernel 2019/08/29 09:34:55 setuid sandbox: enabled 2019/08/29 09:34:55 namespace sandbox: enabled 2019/08/29 09:34:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/29 09:34:55 fault injection: enabled 2019/08/29 09:34:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/29 09:34:55 net packet injection: enabled 2019/08/29 09:34:55 net device setup: enabled 09:36:13 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0xac9, 0x3, [0x5, 0x0, 0x5]}, &(0x7f0000000100)=0xe) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000140)) ioctl$TCFLSH(r0, 0x540b, 0xffffffffffff8000) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000180)="ee79d18c2e56dfffb5a403531859e4b4bb9c1597a73fc801d08b772515fca44b699cef93d3a7c401dcf4c11d0f8615c5b550c9d7ffee69b30a98a93561613187b2c87e4fd3b162114e6707cfdb239ea8b04e5f14fd1064c9364bde512282071b57184c4ddf46dd84917f671c") r3 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r2}, &(0x7f0000000240)=0x8) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000280)={0x18, 0x0, {0x4, @remote, 'yam0\x00'}}) prctl$PR_SET_DUMPABLE(0x4, 0x1) write$uinput_user_dev(r0, &(0x7f00000002c0)={'syz1\x00', {0x7ff, 0x2, 0x24, 0x67}, 0x2a, [0x4, 0xfffffffffffffffc, 0x9, 0x10000, 0x6, 0x690, 0xaf, 0xfffffffffffffffe, 0x9, 0x10001, 0x20, 0xfff, 0xcc000000000, 0xfffffffffffff8ac, 0x49, 0x4, 0x4, 0x7ff, 0x1, 0x0, 0x1, 0x3, 0x81, 0x0, 0x8, 0x3, 0x8001, 0x245, 0x0, 0x7, 0xfb6, 0x4, 0x1000, 0x0, 0x4, 0x9, 0x4, 0xc9, 0x7, 0x3, 0x3, 0xff, 0x4, 0xf77, 0x6, 0x40, 0x0, 0x3, 0x1, 0x0, 0x9, 0x0, 0x1000, 0x5, 0x1ff, 0x0, 0x1, 0x800, 0xf2f, 0xffffffff, 0x7fff, 0x6a, 0x0, 0x7], [0x80, 0x5, 0xffffffffffffff05, 0x0, 0x6, 0x9, 0x1, 0x3, 0x6, 0x9, 0x8001, 0x0, 0x0, 0x8, 0xffffffff7fffffff, 0x6, 0xfffffffffffffffd, 0x3fe000000000000, 0xaff, 0x7, 0x9, 0x7, 0x105a5ae0, 0x5, 0x4, 0x1000, 0x3b4, 0x6, 0x3164, 0x9, 0x10001, 0x7, 0xe501697, 0x4, 0x7, 0x80000001, 0x3, 0x8, 0x1, 0x8, 0x9, 0x1000, 0x8, 0x7ff, 0x7, 0x91, 0xc388, 0x1000, 0x3f, 0x1, 0x3, 0x1, 0x1000, 0x5, 0x7f, 0x4, 0x3, 0x9, 0x7, 0xfffffffffffffee5, 0x6, 0x3, 0xffffffffffffffff, 0x7], [0xcc, 0x4, 0x3, 0x3, 0x2, 0xb8, 0xfffffffffffffff7, 0x5, 0x2, 0x8000, 0x101, 0x3, 0x98, 0x8, 0x101, 0x8, 0xf208, 0x5, 0x9, 0x9, 0x0, 0x400, 0x8000, 0x80, 0x10a260b1, 0x2, 0x100, 0x2, 0x7, 0x20, 0x0, 0x9, 0x6, 0xffffffffffff8000, 0x1f, 0x8, 0x1, 0xe4a, 0x0, 0x7f, 0x2, 0x0, 0x3ee7, 0xfffffffffffffffd, 0x6, 0x5, 0x5, 0x18, 0xffffffffffffff81, 0x800000000000, 0xffffffffffffff12, 0x6, 0x2, 0x7, 0x40, 0xb3, 0x6, 0x81, 0x8, 0x2, 0x7, 0x746, 0x30000000, 0x8000], [0xa5e, 0x5, 0x6c, 0x7ff, 0x6, 0x9, 0x73, 0x100000000, 0x9, 0x3, 0x2, 0x2, 0x7, 0x9, 0x2, 0x200, 0x5, 0x8, 0xfffffffffffffffb, 0x7fffffff, 0x7, 0x0, 0x6, 0x7, 0x80000000, 0x7, 0x1, 0x7, 0x20000000000000, 0x8, 0x9, 0x5, 0x200, 0x7, 0xfff, 0x4, 0x10001, 0x1, 0x3, 0x2fa19f74, 0x7, 0x4, 0x7ff, 0x4, 0x2, 0x987, 0x0, 0x3, 0x2, 0xeb71, 0x274, 0xc4, 0xfffffffffffffff8, 0xfffffffffffffffe, 0x1, 0x2, 0x3f, 0x9, 0x7, 0x6, 0x5, 0x5, 0x1, 0x1]}, 0x45c) r4 = shmget(0x3, 0x2000, 0x800, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_INFO(r4, 0x3, &(0x7f0000000740)=""/123) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000840)={0x0, 0x2, 'client0\x00', 0xffffffff80000000, "24733ea391179f26", "1cc7d32960e30733adfdcc30ff64b2024296e8257b100ba1c6b0639f0fca12a3", 0xfffffffffffffffc}) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000900)) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x6) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000940)={0x18}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000980)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e23, 0x9, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x5}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0xffffffff, @ipv4={[], [], @remote}, 0x7fff}, @in6={0xa, 0x4e22, 0xfffffffffffffffc, @ipv4={[], [], @multicast1}, 0x6}, @in={0x2, 0x4e24, @loopback}], 0x94) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000a80)=""/27) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000ac0)={r1, 0x2}, 0x8) ioctl$KDSETKEYCODE(r5, 0x4b4d, &(0x7f0000000b00)={0x0, 0x101}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b40)='./cgroup/syz1\x00', 0x1ff) r6 = add_key$user(&(0x7f0000000b80)='user\x00', &(0x7f0000000bc0)={'syz', 0x0}, &(0x7f0000000c00)="db4587cc046d0c72cf4c26484992c3930e029d1d5f209eea5f4b70ec98d02c8358c516f614656bd4616af7f70742233369c44b28632a9f8a31362cfc3ba10cb8ac754936486865d7386d0d4b5f94763bcd6a4985bb73ac1a8a8776763672280a3d0d14c5dcd6ec5df00967a3c7e76d347c08104b0076ded1ff7e4787c8e1d9b1ddf3f893ef49aaa20933a563bd93eed2c0ee3d37d33a4bc4749008f4b66b795fb991733e9074cf9917f41d", 0xab, 0xfffffffffffffffe) keyctl$describe(0x6, r6, &(0x7f0000000cc0)=""/121, 0x79) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) r7 = geteuid() setfsuid(r7) listxattr(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/92, 0x5c) [ 129.133956] audit: type=1400 audit(1567071373.697:37): avc: denied { map } for pid=7610 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14988 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 09:36:13 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl(r2, 0x4, &(0x7f0000000080)="1b8c4b01c230e14ce1eddb0596bb6004691fff8099c982e27c71ff20acc946822d5b6b5917fa690b0237dea62855eb4a2ac04f1c8d2b7feb0beeee84a18221f296a1973c1d265e8cc88096dfe968e4bc19ded2a421b67c6c1a6dedc3524c2b0e6f971b56e8c82c6cec877040f56914e81d2b6ae02dfc2f6d5bb08c311ef4649a534267eaf378aef26f1371ffdca93fa8814f2b879fa5e3009d7fbcd2678d5a053d725aba629805544a10e5fc2839947ce91208d507e413be24f46cdad1a289e673c0a0b14e51468a86c4c2990585c84c62658097f48a892b54538fc8c9aa") ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000180)={0x3, [0x8, 0xffffffffffffffff, 0x4]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0)="967c6f38b9d3b119fc160225a40c6bf0079a5df1a680510588be8bf958fb0b5f63536fb27c86ee8ea7e031b8782a12015f73c9308c54b698a28607ae552f784a3e494b50b0", 0x45, r1}, 0x68) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000002c0)=0x8) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000300)={0x100000001, 0x3, 0x1, 0xfffffffffffffad6, 0xfffffffffffffffe, 0x3}) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000340)) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000380)=""/150) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000540)={&(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x1, 0x2, 0x4, 0x3}) r3 = getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000580)={0x5}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000600)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000005c0)=[{}], 0x0, [{}]}, 0x88) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f00000006c0)) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000700)={0x0, 0x4000}) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000740)={0x5, 0x8001, @value}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000b80)=0xe8) syz_mount_image$iso9660(&(0x7f0000000780)='iso9660\x00', &(0x7f00000007c0)='./file0\x00', 0x9, 0x4, &(0x7f0000000a00)=[{&(0x7f0000000800)="e7dcc5533450eb0b904e85dd61", 0xd, 0xffffffffffffff01}, {&(0x7f0000000840)="33ebeb4357b8b8f9c59755dde0566f234136f4a47e163addb00da73fcfa73ff1757cb6158d52b10f3f8a50eb0876d72674b6f12865ef9ff91ecab2dc3c416efcfe7e481e6ff4c21f937ec0ce6264dce92f0cee7f1b840378ae75dc4291c076a7bb0968f57c73bb56fdb4dc31416e0a8d7506481ef6ee333b0e7d5d46c5c1959dfd4006e651708067efed7d6328269bc1", 0x90, 0x7}, {&(0x7f0000000900)="e043f7a053c10e031175a9151c6a4e3a900761d89b39dd6181a609af167edcac0e087516b6432a35a9abd74a0f7061a3c79c619aeb21417113c56eecb8d9ebe9a8dd5f1986e6b4ceb33a9762bb473c79b3c853b1d0b65a7fe62559c0c27f30f5aadce8b97e4e39a8118cbcdea0cb67e82f216968ad8724019210cae076cc820c0c898d61ff558a642a3f7104678ff620ed399cb8f218455f728ccf82d9e4a7", 0x9f, 0x8}, {&(0x7f00000009c0)="53fd5cfec6a1881903cb4f17a3231eab05d71c4f2d39df6b15", 0x19, 0x1}], 0x40, &(0x7f0000000bc0)={[{@nocompress='nocompress'}, {@norock='norock'}, {@block={'block', 0x3d, 0xe00}}, {@check_relaxed='check=relaxed'}], [{@fowner_lt={'fowner<', r4}}, {@obj_role={'obj_role', 0x3d, '-(*GPLmime_type'}}, {@appraise_type='appraise_type=imasig'}, {@dont_appraise='dont_appraise'}, {@subj_user={'subj_user', 0x3d, 'wlan0-bdev'}}, {@dont_hash='dont_hash'}]}) ioctl$void(r2, 0xc0045878) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000c80)={@empty}, &(0x7f0000000cc0)=0x14) socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000d00)={0x0, 0x5}, &(0x7f0000000d40)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000d80)={r5, 0xd3, "9a96fa77a6140c97a7683fa73013deac38a29ec64861b57d9568247f4dd37f924aec634b019d4bbfe8df23c1cac2f5a39abe82191090956a412b62b3eb9632d97675d0be9687ec62e32b6a3bf4aa9a179af6974dda2e6a3f08ec4c4b7ee984629cb13f62fbbdd8950b073a709097230f82107cd16fa847e738358d35f27400e8994229c6891bfff26eac3182b0b7bd8dd8eab354ac5aa2c6d468ffee70c07c7c0656eaf619030732738f6c0a3ea288a2bc7653d05141b3db863403dab042f3a92669edffd39f13b519bccb6638f190de6afc1f"}, &(0x7f0000000e80)=0xdb) setresuid(r4, r4, r4) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000ec0)={r6, @in6={{0xa, 0x4e23, 0x7cd, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}}, 0x7, 0x6}, 0x90) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000f80)={{0x20, 0x9}, {0xe4e, 0xfffffffffffffffb}, 0x8, 0x69014ba219e89c3f, 0x10001}) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000001000)={0x1, 0x0, {0x400, 0x6a6a0f18, 0x300e, 0x4, 0x1, 0x8, 0x2, 0x1}}) mq_timedsend(r0, &(0x7f0000001080)="7e3e2e0a675744cc486171ad6d0057fec59b098708748ccb94a97a08a11eda2381a0c94c75535f01c9b006a4a81537b27417a861a0bb2a282cad2460bed498432f87df3071b68af041d2a003e099cb38a23e5d5495f988fd3f23fee9ab151a5c00784a47179ec84052ab8eb6d3bf8230db", 0x71, 0xbcb, &(0x7f0000001100)={0x77359400}) [ 129.256293] IPVS: ftp: loaded support on port[0] = 21 [ 129.406828] chnl_net:caif_netlink_parms(): no params data found [ 129.439145] IPVS: ftp: loaded support on port[0] = 21 09:36:14 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000040)={0x5, 0x0, [{0xf, 0x3, 0x6, 0x2, 0x3, 0x40, 0x4}, {0xc0000000, 0x7c8, 0x6, 0x1, 0x1000, 0xfffffffffffffff7, 0x1}, {0x80000001, 0x7b0, 0x5, 0x8001, 0x6c2, 0x1, 0x1}, {0x2, 0x8, 0x6, 0x1, 0x1, 0x100000000, 0x1000}, {0x80000000, 0x5, 0x5, 0xffffffffffffffff, 0x10000, 0x429d, 0x4}]}) fdatasync(r0) setsockopt$inet6_int(r1, 0x29, 0x49, &(0x7f0000000140)=0x2, 0x4) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r1, 0x400}, {r1, 0xe1bdfd24958b2a14}, {r1, 0x4000}, {r1, 0x8}, {r0, 0x24}, {r0, 0x9289}, {r1, 0x8}], 0x7, &(0x7f0000000200)={r2, r3+10000000}, &(0x7f0000000240)={0x6}, 0x8) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) select(0x40, &(0x7f0000000280)={0x8000, 0x851a, 0x8, 0xfff, 0x0, 0x101, 0x2, 0x9}, &(0x7f00000002c0)={0xfff, 0x1f, 0x200, 0x0, 0x8, 0x3, 0x8, 0x1}, &(0x7f0000000300)={0x100, 0x100000000, 0x3f, 0x0, 0x20, 0x8000, 0x23a3, 0x501000000}, &(0x7f0000000380)={r4, r5/1000+10000}) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f00000003c0)) write$P9_RCLUNK(r1, &(0x7f0000000440)={0x7, 0x79, 0x1}, 0x7) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000480)={0x2, 0x0, 0x2080, {0x0, 0x0, 0x2}, [], "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", "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"}) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000002500)=0xdc, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000002540)) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000002580)={0x3f, 0xffffffffffffff81, 0x3, 0x8000}) stat(&(0x7f00000025c0)='./file0\x00', &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000002680)=[0xee01, 0x0, 0x0, 0xffffffffffffffff]) fchown(r0, r6, r7) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000026c0)=0x2, 0x4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000002700), &(0x7f0000002740)=0x6) r8 = creat(&(0x7f0000002780)='./file0\x00', 0x90) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f00000027c0)=""/185) connect$netlink(r8, &(0x7f0000002880)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002900)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000002a00)={&(0x7f00000028c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000029c0)={&(0x7f0000002940)={0x50, r9, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1bb200}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x40) write$P9_RMKDIR(r1, &(0x7f0000002a40)={0x14, 0x49, 0x1, {0x1, 0x0, 0x4}}, 0x14) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000002a80), &(0x7f0000002ac0)=0x6) fcntl$setstatus(r8, 0x4, 0x40000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000002b00)='/dev/hwrng\x00', 0x900, 0x0) [ 129.535080] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.543743] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.554487] device bridge_slave_0 entered promiscuous mode [ 129.583834] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.591258] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.598680] device bridge_slave_1 entered promiscuous mode [ 129.677224] chnl_net:caif_netlink_parms(): no params data found [ 129.715923] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 129.733595] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 129.766214] IPVS: ftp: loaded support on port[0] = 21 [ 129.777739] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.785560] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.794172] device bridge_slave_0 entered promiscuous mode [ 129.805959] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 129.815675] team0: Port device team_slave_0 added [ 129.824183] bridge0: port 2(bridge_slave_1) entered blocking state 09:36:14 executing program 3: r0 = userfaultfd(0x800) finit_module(r0, &(0x7f0000000000)='.+\x00', 0x2) r1 = dup2(r0, r0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x89, "45a5d1a696113545d2a212d6c1185fb4fcd3d2158a903c4127faa299cdffdcddbd4c9073166c320367c0fb9ce52f90ebee4012009b4e28ea13aa2405f53ef304d8aab994549cbb87f7313f79bd87ad3295c02f5e1bc96049e24b69f3563560d82c4a9e5c53abfefd3a19013c26f63d2292ed6608c06533a282ceca1a2e05e5fa9ec9988fd8100464f4"}, &(0x7f0000000100)=0xad) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000140)) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000180)=0x101) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f00000001c0)={0x1, 0xc353, 0x8, 'queue1\x00', 0x180}) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000280)=0x80, &(0x7f00000002c0)=0x4) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000300), &(0x7f0000000340)=0xb) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000380)={'filter\x00', 0xbf, "23f5d05c15557bb2b15bb033cf445c41ab1524a55af7315267c65e03f627420c47735f8a5ee79b6c65edd3612c07d58775546c44171a0257c770c6bbb1d9f9d44a687ed4b1a51a8baa136d36c7122cb3faca1d81ae0f920fb72e4da532b412bc3467385133ce6bb953a37d5b8892239dc63519ae255719ba75ceeb0e389b96275326a23bc79cc249401e64f64cc47341a869ae594d99cba6895480cfa72806f8eba27756f8e6c2c2ad5f62e998834de7b96e5fb7acbb0d5b6f615912a88aba"}, &(0x7f0000000480)=0xe3) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000500)={{0x4, @name="b3d057090e5616c46901cd3cdfa6d1a1e9d2a313490051f2e0636910dfdbb474"}, 0x8, 0x80000001, 0x2}) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x8860) execve(&(0x7f0000000540)='./file0\x00', &(0x7f0000000780)=[&(0x7f0000000580)='vboxnet1\xac\x00', &(0x7f00000005c0)='.+\x00', &(0x7f0000000600)='/selinux/avc/hash_stats\x00', &(0x7f0000000640)='nodev+\x00', &(0x7f0000000680)='/selinux/avc/hash_stats\x00', &(0x7f00000006c0)='#wlan1wlan1vmnet0em0vmnet1\x00', &(0x7f0000000700)='/selinux/avc/hash_stats\x00', &(0x7f0000000740)='.+\x00'], &(0x7f0000000940)=[&(0x7f00000007c0)='filter\x00', &(0x7f0000000800)='/selinux/avc/hash_stats\x00', &(0x7f0000000840)='queue1\x00', &(0x7f0000000880)='(system}\x00', &(0x7f00000008c0)='-\x00', &(0x7f0000000900)='\x00']) getrusage(0x1, &(0x7f0000000980)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) accept$unix(r2, &(0x7f0000000ac0)=@abs, &(0x7f0000000b40)=0x6e) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x2) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/snapshot\x00', 0x100, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000c40)=r2) r4 = accept4(r3, &(0x7f0000000c80)=@ax25={{0x3, @bcast}, [@remote, @rose, @remote, @netrom, @rose, @bcast, @default, @default]}, &(0x7f0000000d00)=0x80, 0x0) write$binfmt_misc(r4, &(0x7f0000000d40)={'syz1', "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"}, 0x1004) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000001d80)={0x1, @capture={0x1000, 0x1, {0x4, 0x6}, 0x5, 0x8}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)='trusted.overlay.nlink\x00', &(0x7f0000001f00)={'L+', 0xffffffffffffffff}, 0x28, 0x1) write$P9_RMKDIR(r1, &(0x7f0000001f40)={0x14, 0x49, 0x1, {0x4, 0x3, 0x7}}, 0x14) connect$inet(r4, &(0x7f0000001f80)={0x2, 0x4e23, @local}, 0x10) r5 = syz_open_dev$midi(&(0x7f0000001fc0)='/dev/midi#\x00', 0xee, 0x200a02) ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f0000002000)={0x1, 0x0, {0x8000, 0x1, 0x2004, 0x8, 0xb74649282a8b3a0d, 0x4, 0x1, 0x2}}) [ 129.832333] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.840745] device bridge_slave_1 entered promiscuous mode [ 129.853857] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 129.862792] team0: Port device team_slave_1 added [ 129.878176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 129.904308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 129.944028] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 129.956173] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:36:14 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWALK(r1, &(0x7f0000000040)={0x3d, 0x6f, 0x2, {0x4, [{0x20, 0x1, 0x7}, {0x0, 0x3, 0x4}, {0x40, 0x1, 0x4}, {0x4, 0x3, 0x1}]}}, 0x3d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0xfffffffffffffffe, 0x8000, 0x5, 0x3, 0x1, 0xb95a, 0x8001, 0xaaa1, 0x2, 0x7}) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) getsockopt$inet6_opts(r1, 0x29, 0x9611c828d5dc214b, &(0x7f0000000140)=""/221, &(0x7f0000000240)=0xdd) r2 = socket$tipc(0x1e, 0x63e239f055baa159, 0x0) unlink(&(0x7f0000000280)='./file0\x00') ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000300)=&(0x7f00000002c0)) sched_yield() ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000013c0)={0x9, 0xa95, &(0x7f0000000340)="6898ea9a3a75e7dd58bffcf43139bd4a68ee6e37bcd8005669758f3bde585a6a545f803d749ec682b4932a1c6d36dcf193cefe2d222aab07361864a26836ed5476d47b496550408352a130c550db397d2e1fccf4ee8e", &(0x7f00000003c0)="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", 0x56, 0x1000}) getrlimit(0x8, &(0x7f0000001400)) r3 = signalfd(r0, &(0x7f0000001440), 0x8) r4 = getpid() lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000015c0)={r4, r5, r6}, 0xc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000001600)={0x1, 0x7f, 0x8, {0x77359400}, 0x10000, 0x4e}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000001700)={@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 0x4, 0x4, 0x4, 0x4}}, {&(0x7f0000001680)=""/41, 0x29}, &(0x7f00000016c0), 0x10}, 0xa0) ioctl$TCSETS(r3, 0x5402, &(0x7f00000017c0)={0x8, 0x9, 0x9, 0x0, 0x18, 0x47, 0xffffffffffff8000, 0x8000, 0x3ff, 0x7fff, 0xfffffffffffffff9, 0xb9}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000001800)={0x0, 0x5f, "202038b49a26372a71b12da74aeaaab97efeb17834fdca759096a028f411eceee969f330d349cdc45bd85ade3d3f2edd1750f762af1d46781d9108bd32277335b37fd27ce1c958835409815865c2b78fc7bc3b51db9ba508e20c39aaaba856"}, &(0x7f0000001880)=0x67) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000018c0)={r7, 0x200, 0x1, [0x7]}, 0xa) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001900)={0x3f, 0x9, 0x30a6, 0x22}, 0x8) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000001940)={0xd19, 0x0, 0x8, 0x7, 0x5, 0x80000000}) write$P9_RFLUSH(r0, &(0x7f0000001980)={0x7, 0x6d, 0x1}, 0x7) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000019c0)={'icmp6\x00'}, &(0x7f0000001a00)=0x1e) readlinkat(r0, &(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)=""/128, 0x80) r8 = syz_open_dev$radio(&(0x7f0000001b00)='/dev/radio#\x00', 0x3, 0x2) ioctl$PIO_UNIMAPCLR(r8, 0x4b68, &(0x7f0000001b40)={0x3, 0xc0, 0x80}) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) [ 130.012677] device hsr_slave_0 entered promiscuous mode [ 130.049991] device hsr_slave_1 entered promiscuous mode [ 130.090389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 130.110932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 130.114485] IPVS: ftp: loaded support on port[0] = 21 [ 130.154358] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 130.170851] team0: Port device team_slave_0 added [ 130.204321] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.210851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.217715] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.224123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.241871] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 130.249381] team0: Port device team_slave_1 added [ 130.314789] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 09:36:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$uinput_user_dev(r0, &(0x7f0000000000)={'syz0\x00', {0x1, 0x400, 0x8000, 0x7fff}, 0x41, [0x1, 0xdd, 0x6, 0x6, 0x5, 0x6, 0x8, 0x7, 0x9, 0x5, 0x6, 0x1, 0x6, 0x2, 0xffffffffffffd536, 0x6, 0x3, 0x3, 0x0, 0x1ff, 0x1, 0x3a77, 0x356b, 0x0, 0x9, 0x3, 0x3, 0xfffffffffffffffd, 0x3, 0xa434, 0x5, 0x646c, 0x9, 0x9, 0xde, 0x7, 0x20, 0x3, 0x8, 0x5, 0x100000000, 0xffffffffffffffa6, 0x8, 0x7, 0x7, 0x3, 0x2, 0x9, 0x6, 0x8, 0x8707, 0x2, 0x81, 0x1, 0x3, 0x80000001, 0x6e, 0x42, 0x8, 0xf95f, 0xfff, 0x2, 0x7, 0x27f], [0xc76, 0x3, 0x0, 0x3, 0x0, 0x8, 0x7, 0x3, 0x7, 0x68, 0x5, 0x141d, 0x8, 0x7, 0x41, 0x0, 0x9, 0x3ff, 0xfffffffffffffffd, 0x7, 0x3, 0x200, 0x8, 0x1, 0xba, 0x6, 0x5, 0x4, 0x80000001, 0x2, 0x4, 0x2, 0x3, 0x9, 0x6, 0x10001, 0x200, 0x40, 0x100, 0x550, 0x5, 0x1000, 0x100000001, 0x40, 0xffff, 0x7bf, 0x2, 0x8000, 0x7, 0x1, 0x6, 0x10000, 0x9, 0x7, 0x1, 0x5, 0x0, 0x3, 0x3, 0x9, 0x7fffffff, 0x80000000, 0x0, 0x100000000], [0x9, 0x0, 0x2, 0x4, 0x3, 0x800, 0x2, 0x2, 0x100000001, 0x0, 0x7, 0x783, 0xdb, 0x1f, 0x20, 0x7, 0x5, 0x6, 0x9, 0x8, 0x800, 0x7, 0x1, 0x6, 0x28, 0x9, 0x1f, 0x1ff, 0x4, 0x1, 0x10000, 0x1, 0x3, 0x2, 0x5, 0x2, 0x0, 0x6c74, 0x200, 0x0, 0xf6, 0x2, 0x8000, 0x2, 0xfffffffffffffff9, 0xdc, 0x7, 0x3, 0x9, 0x3ff, 0x0, 0x63f7, 0x6, 0x3, 0xb3, 0x0, 0xfff, 0x1, 0x83, 0x80000000, 0x1f, 0x1, 0x7, 0x5], [0x2, 0xf800000000000000, 0x8, 0xce, 0x6, 0x100, 0x3, 0xee50, 0x682, 0x583, 0x10000, 0x7fff, 0x8, 0x2, 0x7, 0x6, 0x80, 0x0, 0x10001, 0x81, 0x30b49430, 0x7, 0x400, 0xe5b4, 0x1, 0x5, 0xd6, 0x336, 0x3, 0x9, 0x8, 0x7ff, 0x0, 0xffffffffffffffc0, 0x7a4f, 0x6, 0x6, 0xfff, 0x81, 0xa32, 0xd1, 0xffff, 0x0, 0x97, 0x10001, 0x9, 0x3, 0x5, 0x0, 0x9, 0xf0be, 0x6, 0x4, 0xff, 0x12, 0x2, 0x5, 0x2, 0x51be625f, 0x7, 0x2, 0x7, 0x800, 0x286f4a07]}, 0x45c) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000480)={0x3, [0x0, 0x0, 0x0]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000004c0)=[@in6={0xa, 0x4e20, 0xfffffffffffffff9, @empty, 0x64f8}, @in6={0xa, 0x4e24, 0xffff, @local, 0x9}], 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000640)={0xb, 0x10, 0xfa00, {&(0x7f0000000500), r1, 0x33}}, 0x18) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0x4) ioctl$CAPI_MANUFACTURER_CMD(r4, 0xc0104320, &(0x7f0000000800)={0x5, &(0x7f0000000780)="a50edf240950fc76667380bfeb2e737516c9799ab2f0ec80ecd69e17008d0d80711b7e9f8ed5560c9f6651d076e44a9d23abd6e7090f81bdce42f05a2c67a1c10a1cb4198c8a96f1c3606219ba6d8d13c9e3d5abc1ea43a0ea9eb933441ea45ae6c21e625ee302e8f99810dd0daadde66a4a6317"}) r5 = add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="fce1cddb3c3e66e8e8204e49eab44972a7e07a43b103778d6bd26cb77f5e25b8ea906e608c7e62890e122865a0cf7f19efc2a8a386b8a6fad6783db7fa7a908f862ad6cb31fb489fa45ca589b394d92c1893abdeb10537d3efc155b65c76c964f06b667a6acc05ac3ec89a4e9ed4a33dc13d7028e415c886df0822409bda3fa97d93b74a945046621ed1fb9e9a735fe92a84fecff480544626f1eb6c8260784cb3fc011da2cb392176bf80938caa3a896de358776259bb", 0xb7, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000980)='trusted\x00', &(0x7f00000009c0)={'syz', 0x0}, &(0x7f0000000a00)="a929190038bbf3b0a39d6896318d8c749cb5c7090250c9cf2d6d72fd85d7c4f4fa96b161fc1bf4d556648a04eb17ec92eb40a7666e8b78620f3481de16f0281f50614fd75c1ee2f1b8c82aa0ffbbad689511f4122bcc15edf157345d8d354724d682fe99772f3d028d4846e777e3f864b6", 0x71, 0xfffffffffffffffb) keyctl$negate(0xd, r5, 0x8000, r6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000a80)={0x0, 0x8, 0x10}, &(0x7f0000000ac0)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000b00)={r7, 0x50, "36089164c0f9685ad38f6fdd052b879c88f413f566d7b1552017303a6aadad1c5fefdcc9125ead9765a6644613c61582c66a697096cc2e975038a45b9411dd24d341210b49091278b8469524f54dff23"}, &(0x7f0000000b80)=0x58) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x6) r8 = syz_open_dev$vcsn(&(0x7f0000000bc0)='/dev/vcs#\x00', 0x8, 0x400) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() syz_mount_image$ntfs(&(0x7f0000000c00)='ntfs\x00', &(0x7f0000000c40)='./file0\x00', 0x9, 0x4, &(0x7f0000000f00)=[{&(0x7f0000000c80)="a7222418b4310fcc407d601ca19da7195056ddadde8d7b2465994a063618b3cd91d81ff48835dad221fb14a80fea57c9b7e004d03e9e93307cb2b54224af3a76d8507fcc910d75aa7c97ab36fc93cc5f1134924b3df67cf0942b26be7c97aa543de8df74b2904a8eae2a807e1619a9480139d5ff1ea6eec515e682cef87ce39ab49ba78df17c5d9a01856c5d6304737f864b4608b567b71caa89d7ba5f0ed267143daf0229c3930f569a5af8a6cfd7344125ebd35a6a6c599989836396a2ace5b822bb0c79fe439daf5fd975023ddc2e83d232da30b8eb6f397478f222129ad13415997184fdde509d5698308b835331be045ef75a4b60f2", 0xf8, 0x833e}, {&(0x7f0000000d80)="a725f538eee0e1bc3d1310e1c71e990e919b14a95c803d7f7dbf6dd7c99010d7713a89c8049248f2", 0x28, 0x80}, {&(0x7f0000000dc0)="fec9c09acf25e887a28a6b3e38cebccff5cff200a126dccf425d6b2e277ceee862c39b021e184c7240fee3", 0x2b, 0x3}, {&(0x7f0000000e00)="cd40e58ec2d72079b29e2a934c6a789ea837219a6a28e585a522ab106d56dd359716e56548d1a6559bc68b6c64d12ef0370b02979661708ed1886d77a37a65439dff40800cd554d63d1069a185f6e9a0a78b740c9399228acc24f8d8aa04c76983710d8b45c1e0486e283efd288320a158e78fc911da71f3595509d4093b6c9478e4d893470862ff18c558d19d8d857a63b502f276af61c5ee01dfdb644ed4235ebf9f124e1cca12f57287210b9211968c041d7831f4e26ea5f2a4436c50b3a65db2", 0xc2, 0x100000000}], 0x10080, &(0x7f0000001100)={[{@case_sensitive_no='case_sensitive=no'}, {@gid={'gid', 0x3d, r9}}, {@dmask={'dmask', 0x3d, 0x8a87}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid', 0x3d, r10}}, {@disable_sparse_no='disable_sparse=no'}, {@errors_remount='errors=remount-ro'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, 'bdev\xecusertrusted'}}, {@smackfsroot={'smackfsroot', 0x3d, '/proc/sys/net/ipv4/vs/snat_reroute\x00'}}, {@uid_lt={'uid<', r11}}, {@permit_directio='permit_directio'}]}) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000001240)={'veth0_to_hsr\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}}) getpeername(r3, &(0x7f0000001900)=@can={0x1d, 0x0}, &(0x7f0000001980)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000019c0)={'vcan0\x00', r12}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000001a00)=0x6, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r8, 0xc0045516, &(0x7f0000001a40)=0x693) ioctl$SIOCRSGL2CALL(r8, 0x89e5, &(0x7f0000001a80)=@bcast) openat$random(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/urandom\x00', 0x109000, 0x0) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) r13 = socket$isdn(0x22, 0x3, 0x0) fsetxattr$security_smack_entry(r13, &(0x7f0000001b00)='security.SMACK64EXEC\x00', &(0x7f0000001b40)='vcan0\x00', 0x6, 0xbdeb2e08d4d6d2bb) [ 130.360269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 130.372163] IPVS: ftp: loaded support on port[0] = 21 [ 130.383594] chnl_net:caif_netlink_parms(): no params data found [ 130.425396] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.445423] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.533960] device hsr_slave_0 entered promiscuous mode [ 130.570051] device hsr_slave_1 entered promiscuous mode [ 130.612673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 130.636041] IPVS: ftp: loaded support on port[0] = 21 [ 130.642271] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 130.678063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.707338] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.717277] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.725871] device bridge_slave_0 entered promiscuous mode [ 130.734971] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.741743] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.748811] device bridge_slave_1 entered promiscuous mode [ 130.814967] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 130.824346] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 130.833725] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 130.843700] chnl_net:caif_netlink_parms(): no params data found [ 130.860926] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 130.894007] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 130.901640] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 130.915133] team0: Port device team_slave_0 added [ 130.922723] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 130.930530] team0: Port device team_slave_1 added [ 130.945171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.953588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.967457] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 130.973915] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.985242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.027184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 131.035898] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.042789] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.049930] device bridge_slave_0 entered promiscuous mode [ 131.057431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 131.072312] chnl_net:caif_netlink_parms(): no params data found [ 131.091709] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.098093] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.106694] device bridge_slave_1 entered promiscuous mode [ 131.119893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.127690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.136009] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.142598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.151865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 131.201777] device hsr_slave_0 entered promiscuous mode [ 131.260123] device hsr_slave_1 entered promiscuous mode [ 131.309989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.318166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.326545] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.333326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.349509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 131.358039] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 131.368172] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 131.377702] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 131.391957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.413476] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.442390] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 131.450565] team0: Port device team_slave_0 added [ 131.457427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 131.464987] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.472341] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.479648] device bridge_slave_0 entered promiscuous mode [ 131.487883] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.494380] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.501798] device bridge_slave_1 entered promiscuous mode [ 131.515684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.526188] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 131.534310] team0: Port device team_slave_1 added [ 131.539931] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.585521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 131.604863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 131.613922] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 131.624351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.646250] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 131.656511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.664600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.674601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 131.681850] chnl_net:caif_netlink_parms(): no params data found [ 131.752502] device hsr_slave_0 entered promiscuous mode [ 131.790023] device hsr_slave_1 entered promiscuous mode [ 131.830399] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.837491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.846336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.860669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 131.868142] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 131.875712] team0: Port device team_slave_0 added [ 131.882044] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 131.889318] team0: Port device team_slave_1 added [ 131.896125] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 131.908338] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 131.925158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.933788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.942265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.952438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.959439] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 131.978978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.988003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.997817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 132.007037] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 132.017649] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.030138] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.036569] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.043867] device bridge_slave_0 entered promiscuous mode [ 132.051866] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 132.058061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.121598] device hsr_slave_0 entered promiscuous mode [ 132.159989] device hsr_slave_1 entered promiscuous mode [ 132.200424] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 132.207687] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 132.215726] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.222344] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.229454] device bridge_slave_1 entered promiscuous mode [ 132.246635] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 132.275091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.283243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.293209] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 132.305655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 132.313826] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 132.320478] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.328367] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 132.365053] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 132.377288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 132.388996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.405148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.415272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.423604] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.430009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.444738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.456044] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.468514] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 132.477328] team0: Port device team_slave_0 added [ 132.484128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.494164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 132.507186] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 132.513594] audit: type=1400 audit(1567071377.067:38): avc: denied { associate } for pid=7611 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 132.538168] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 132.546231] team0: Port device team_slave_1 added [ 132.554489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.563395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.571258] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.577698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.584922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.592552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.601160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 132.615662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.623643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 132.631657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 132.651611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:36:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/251, 0xfb}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) shutdown(r1, 0x0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000100)={0x1e}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xfffffdc4, 0x0, 0x0, 0x800e0051e) shutdown(r2, 0x0) [ 132.679174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 132.694780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.704978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.713385] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 132.720146] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.775139] device hsr_slave_0 entered promiscuous mode [ 132.830132] device hsr_slave_1 entered promiscuous mode [ 132.870263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:36:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0xffffffffffffffff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 132.882473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 132.892434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 132.903400] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.915984] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 132.924954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.939354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.948637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.957151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.966126] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 132.982111] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.988473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.998108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.008142] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 133.022743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 133.037945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 133.045274] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 133.058692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.067650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.075837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.083940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.092067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.099021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.107137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.115191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.123322] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.129842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.137088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.144277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.153442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.166649] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.173793] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.187032] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.194684] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.205918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.217307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.226188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 09:36:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca50d5e0bcfe47ff070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) [ 133.242503] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.260650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.268619] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 133.287398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.297340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.305626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.313480] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.320024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.327200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.335157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.343496] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.344977] syz-executor.0 (7650): /proc/7650/oom_adj is deprecated, please use /proc/7650/oom_score_adj instead. [ 133.349926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.351863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.375889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.384638] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.398856] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 133.405737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.420252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.427952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.435909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.443755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.452097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.461599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 133.474939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.484274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:36:18 executing program 0: open(0x0, 0x141042, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) [ 133.492364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.501045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.509100] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.515618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.533331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.541638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.549763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.557709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.565750] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.572177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.579839] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.597567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.608697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.623072] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 133.629532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.637761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.648720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.659303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.686692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.696663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.709508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.729484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.748302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.763873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.775645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.787603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.797580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.813305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.825494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.834396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.843393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.851751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.860083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.870297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.886072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.895246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.912924] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.932220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.939042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:36:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r2) [ 133.948813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.957484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.965797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.973963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.982294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.990424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.998251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.007200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.019445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.027516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.038109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 134.050868] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.056967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.068502] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.083217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:36:18 executing program 0: getuid() r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) [ 134.103725] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.112584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.128838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.150359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 134.158497] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 134.174701] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.181227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.194653] 8021q: adding VLAN 0 to HW filter on device bond0 09:36:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 134.226819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.250532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.264236] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 09:36:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 134.289521] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.315825] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.346095] hfs: session requires an argument [ 134.355998] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.356580] hfs: unable to parse mount options [ 134.374025] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 134.393153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.418225] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.427047] hfs: session requires an argument [ 134.433838] hfs: unable to parse mount options [ 134.444469] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 134.479861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.500929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.532526] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 134.550798] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.599568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 134.607595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.622069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.647479] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.654014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.687988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 134.717023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.729394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.760907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.768691] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.775121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.785068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 134.807133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.851649] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 134.858628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.887023] audit: type=1400 audit(1567071379.447:39): avc: denied { create } for pid=7699 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 134.889346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 09:36:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) 09:36:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 134.927440] audit: type=1400 audit(1567071379.447:40): avc: denied { write } for pid=7699 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 134.930636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.972867] audit: type=1400 audit(1567071379.487:41): avc: denied { read } for pid=7699 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 134.985577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 09:36:19 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x0) close(r0) [ 135.027217] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.037101] hfs: session requires an argument [ 135.051417] hfs: unable to parse mount options [ 135.061042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 135.099332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 135.126108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.137137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.159265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.167099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.177839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 135.210253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.222054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.261151] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 135.267539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.297771] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 135.317351] 8021q: adding VLAN 0 to HW filter on device batadv0 09:36:19 executing program 5: r0 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 159.555092] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 159.562837] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 159.570114] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 159.577400] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 159.584762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 159.592038] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) 09:36:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) 09:36:44 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) 09:36:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) 09:36:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:36:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) [ 160.222008] FAULT_INJECTION: forcing a failure. [ 160.222008] name failslab, interval 1, probability 0, space 0, times 0 [ 160.234347] CPU: 0 PID: 8262 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 160.241298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.250758] Call Trace: [ 160.253379] dump_stack+0x172/0x1f0 [ 160.257043] should_fail.cold+0xa/0x1b [ 160.261036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.261051] ? lock_downgrade+0x810/0x810 [ 160.261076] __should_failslab+0x121/0x190 [ 160.261098] should_failslab+0x9/0x14 [ 160.270574] kmem_cache_alloc+0x2ae/0x700 [ 160.270588] ? __alloc_fd+0x44d/0x560 [ 160.270605] ? shmem_destroy_callback+0xc0/0xc0 [ 160.270617] shmem_alloc_inode+0x1c/0x50 [ 160.270631] alloc_inode+0x64/0x190 [ 160.270647] new_inode_pseudo+0x19/0xf0 [ 160.302987] new_inode+0x1f/0x40 [ 160.306403] shmem_get_inode+0x84/0x780 [ 160.310406] __shmem_file_setup.part.0+0x7e/0x2b0 [ 160.315291] shmem_file_setup+0x66/0x90 [ 160.319299] __x64_sys_memfd_create+0x2a2/0x470 [ 160.324100] ? memfd_fcntl+0x1a50/0x1a50 [ 160.328184] ? do_syscall_64+0x26/0x620 [ 160.332178] ? lockdep_hardirqs_on+0x415/0x5d0 [ 160.336781] ? trace_hardirqs_on+0x67/0x220 [ 160.341128] do_syscall_64+0xfd/0x620 [ 160.344955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.350158] RIP: 0033:0x459879 [ 160.350174] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:36:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000100)="2e0f01cb66b8090000000f23c00f21f86635030006000f23f8640f01c8baf80c66b86231948666efbafc0cb000ee0f22e26766c7442400000000006766c7442402fcbc00006766c744240600000000670f011c240f01c8f30fa6c00f38ca5e002e0f01c5", 0x64}], 0x1, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="9e4f8c077dadcba4a46c849cc266dbdaebafec7092cc781f5d01553903433a86ff0375628a9b03e9f5fb2b8f728c673ff9fede6169ed238c2daafc03249bbabc1d82e52a59a821a0b91570b44162ecb7cd4dc776002926d36bd27f72a9191e0d449f5a5ebfa8dd1fb4ecc75f078c576dfc291333bed71ed49ef68287a3ac7e3d89b90c1f97a31a48aeda764076fb2703ace788e8b13b263a4526343482cf70ef134ba7409e5d3eec82ff119127ac4361652be1f86cc479a296e9cbcf0814310b07a910588f2a302364ae7e1922b15b22c343050ac843cfc5ffa67ca8ace2a2bc5a", 0xe1, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f00000002c0)='\x00', &(0x7f0000000300)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000080)={0x20003}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:36:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) [ 160.372251] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 160.372267] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 160.372275] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 160.372287] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 160.372295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 160.372303] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) 09:36:45 executing program 3: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffb) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f00000000c0)=0xf) 09:36:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) pread64(r1, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:36:45 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 160.749429] FAULT_INJECTION: forcing a failure. [ 160.749429] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 160.761371] CPU: 0 PID: 8295 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 160.768313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.777687] Call Trace: [ 160.780303] dump_stack+0x172/0x1f0 [ 160.783963] should_fail.cold+0xa/0x1b [ 160.787893] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.793015] ? mark_held_locks+0x100/0x100 [ 160.797300] __alloc_pages_nodemask+0x1ee/0x750 [ 160.802012] ? find_held_lock+0x35/0x130 [ 160.806102] ? __alloc_pages_slowpath+0x2870/0x2870 [ 160.811157] cache_grow_begin+0x91/0x8c0 [ 160.815244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 160.821003] ? check_preemption_disabled+0x48/0x290 [ 160.826140] kmem_cache_alloc+0x63b/0x700 [ 160.830318] ? shmem_destroy_callback+0xc0/0xc0 [ 160.835007] shmem_alloc_inode+0x1c/0x50 [ 160.839103] alloc_inode+0x64/0x190 [ 160.842746] new_inode_pseudo+0x19/0xf0 [ 160.846736] new_inode+0x1f/0x40 [ 160.850116] shmem_get_inode+0x84/0x780 [ 160.854115] __shmem_file_setup.part.0+0x7e/0x2b0 [ 160.858980] shmem_file_setup+0x66/0x90 [ 160.863149] __x64_sys_memfd_create+0x2a2/0x470 [ 160.867924] ? memfd_fcntl+0x1a50/0x1a50 [ 160.872170] ? do_syscall_64+0x26/0x620 [ 160.876155] ? lockdep_hardirqs_on+0x415/0x5d0 [ 160.880756] ? trace_hardirqs_on+0x67/0x220 [ 160.885098] do_syscall_64+0xfd/0x620 [ 160.888918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.894118] RIP: 0033:0x459879 [ 160.897323] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.916235] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 160.924000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 160.931371] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 160.938657] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 09:36:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 160.945939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 160.953308] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 160.983791] hfs: session requires an argument [ 161.002022] hfs: unable to parse mount options 09:36:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) 09:36:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:36:45 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) [ 161.362705] FAULT_INJECTION: forcing a failure. [ 161.362705] name failslab, interval 1, probability 0, space 0, times 0 [ 161.412448] CPU: 1 PID: 8318 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 161.419428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.428789] Call Trace: [ 161.431396] dump_stack+0x172/0x1f0 [ 161.435035] should_fail.cold+0xa/0x1b [ 161.438935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 161.444072] ? lock_downgrade+0x810/0x810 [ 161.448240] __should_failslab+0x121/0x190 [ 161.452490] should_failslab+0x9/0x14 [ 161.456385] kmem_cache_alloc+0x2ae/0x700 [ 161.460540] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 161.465651] ? lockdep_hardirqs_on+0x415/0x5d0 [ 161.470263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 161.475805] ? timespec64_trunc+0xf0/0x180 [ 161.480057] __d_alloc+0x2e/0x9c0 [ 161.483533] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 161.488749] d_alloc_pseudo+0x1e/0x70 [ 161.492560] alloc_file_pseudo+0xe2/0x280 [ 161.496711] ? __lockdep_init_map+0x10c/0x5b0 [ 161.501216] ? alloc_file+0x4d0/0x4d0 [ 161.505034] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 161.510668] ? kasan_check_write+0x14/0x20 [ 161.514918] __shmem_file_setup.part.0+0x108/0x2b0 [ 161.519948] shmem_file_setup+0x66/0x90 [ 161.523941] __x64_sys_memfd_create+0x2a2/0x470 [ 161.528626] ? memfd_fcntl+0x1a50/0x1a50 [ 161.532692] ? do_syscall_64+0x26/0x620 [ 161.536677] ? lockdep_hardirqs_on+0x415/0x5d0 [ 161.541269] ? trace_hardirqs_on+0x67/0x220 [ 161.545599] do_syscall_64+0xfd/0x620 [ 161.549493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.554690] RIP: 0033:0x459879 [ 161.557888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.577574] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 161.585293] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 161.592684] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 161.599961] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 161.607245] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 161.614663] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x8927, 0x0) 09:36:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x8927, 0x0) 09:36:46 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x8927, 0x0) [ 162.202342] FAULT_INJECTION: forcing a failure. [ 162.202342] name failslab, interval 1, probability 0, space 0, times 0 [ 162.268639] CPU: 1 PID: 8334 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 162.275638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.285000] Call Trace: [ 162.287607] dump_stack+0x172/0x1f0 [ 162.291262] should_fail.cold+0xa/0x1b [ 162.295176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 162.300320] ? lock_downgrade+0x810/0x810 [ 162.304492] __should_failslab+0x121/0x190 [ 162.308735] should_failslab+0x9/0x14 [ 162.312540] kmem_cache_alloc+0x2ae/0x700 [ 162.316701] __alloc_file+0x27/0x330 [ 162.320425] alloc_empty_file+0x72/0x170 [ 162.324865] alloc_file+0x5e/0x4d0 [ 162.328415] alloc_file_pseudo+0x189/0x280 [ 162.332658] ? alloc_file+0x4d0/0x4d0 [ 162.336470] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 162.342021] ? kasan_check_write+0x14/0x20 [ 162.346536] __shmem_file_setup.part.0+0x108/0x2b0 [ 162.351481] shmem_file_setup+0x66/0x90 [ 162.355551] __x64_sys_memfd_create+0x2a2/0x470 [ 162.360256] ? memfd_fcntl+0x1a50/0x1a50 [ 162.364324] ? do_syscall_64+0x26/0x620 [ 162.368302] ? lockdep_hardirqs_on+0x415/0x5d0 [ 162.372893] ? trace_hardirqs_on+0x67/0x220 [ 162.377312] do_syscall_64+0xfd/0x620 [ 162.381125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.386316] RIP: 0033:0x459879 [ 162.389600] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.408594] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 162.416401] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 162.423673] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 162.430965] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 162.438329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 162.445599] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:47 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 162.644861] FAULT_INJECTION: forcing a failure. [ 162.644861] name failslab, interval 1, probability 0, space 0, times 0 [ 162.685731] CPU: 1 PID: 8341 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 162.692783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.702149] Call Trace: [ 162.704851] dump_stack+0x172/0x1f0 [ 162.708492] should_fail.cold+0xa/0x1b [ 162.712402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 162.717554] ? lock_downgrade+0x810/0x810 [ 162.721755] __should_failslab+0x121/0x190 [ 162.726002] should_failslab+0x9/0x14 [ 162.729808] kmem_cache_alloc+0x2ae/0x700 [ 162.733972] __alloc_file+0x27/0x330 [ 162.737783] alloc_empty_file+0x72/0x170 [ 162.741861] alloc_file+0x5e/0x4d0 [ 162.745415] alloc_file_pseudo+0x189/0x280 [ 162.749659] ? alloc_file+0x4d0/0x4d0 [ 162.753471] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 162.759013] ? kasan_check_write+0x14/0x20 [ 162.763447] __shmem_file_setup.part.0+0x108/0x2b0 [ 162.768484] shmem_file_setup+0x66/0x90 [ 162.772469] __x64_sys_memfd_create+0x2a2/0x470 [ 162.777143] ? memfd_fcntl+0x1a50/0x1a50 [ 162.781207] ? do_syscall_64+0x26/0x620 [ 162.785183] ? lockdep_hardirqs_on+0x415/0x5d0 [ 162.789857] ? trace_hardirqs_on+0x67/0x220 [ 162.794201] do_syscall_64+0xfd/0x620 [ 162.798034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.803235] RIP: 0033:0x459879 [ 162.806444] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.825354] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 162.833085] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 162.840359] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 162.847634] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 162.854904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 162.862175] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x1, 0x2, {0x2, 0x1, 0x20, 0x2, 0x1f}}) r2 = socket$isdn(0x22, 0x2, 0x22) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000140), &(0x7f00000000c0)=0x4) dup2(r0, r2) 09:36:47 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) 09:36:47 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101000, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x4, r0, &(0x7f0000000000)="3a07d2bef41634655f521c71e84209fa78e448fe5c721a74370c4f3dc689f1911ef77933496757c833cf47ef9e0854b01591f89594712adc306e6a28a71ba60a6ab4b375f405991956189d0e78a0b46124fa68c35e72fd1838018476a3b8261be81b9a55cbdeb50d85e35f1849cd613a16d37b93a626", 0x76, 0xc9, 0x0, 0x0, r2}]) 09:36:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:36:47 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 163.402746] FAULT_INJECTION: forcing a failure. [ 163.402746] name failslab, interval 1, probability 0, space 0, times 0 [ 163.417330] delete_channel: no stack [ 163.434397] delete_channel: no stack [ 163.443837] CPU: 0 PID: 8359 Comm: syz-executor.2 Not tainted 4.19.69 #43 09:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x1, 0x2, {0x2, 0x1, 0x20, 0x2, 0x1f}}) r2 = socket$isdn(0x22, 0x2, 0x22) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000140), &(0x7f00000000c0)=0x4) dup2(r0, r2) [ 163.450816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.460289] Call Trace: [ 163.463077] dump_stack+0x172/0x1f0 [ 163.466725] should_fail.cold+0xa/0x1b [ 163.470722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 163.475948] ? lock_downgrade+0x810/0x810 [ 163.480135] __should_failslab+0x121/0x190 [ 163.484392] should_failslab+0x9/0x14 [ 163.488303] kmem_cache_alloc+0x2ae/0x700 [ 163.492469] ? rcu_read_lock_sched_held+0x110/0x130 [ 163.497263] delete_channel: no stack 09:36:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 163.497499] selinux_file_alloc_security+0xb4/0x190 [ 163.506235] security_file_alloc+0x63/0xa0 [ 163.510592] __alloc_file+0xcf/0x330 [ 163.514331] alloc_empty_file+0x72/0x170 [ 163.518408] alloc_file+0x5e/0x4d0 [ 163.521967] alloc_file_pseudo+0x189/0x280 [ 163.526217] ? alloc_file+0x4d0/0x4d0 [ 163.530082] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 163.535638] ? kasan_check_write+0x14/0x20 [ 163.539904] __shmem_file_setup.part.0+0x108/0x2b0 [ 163.544883] shmem_file_setup+0x66/0x90 [ 163.548982] __x64_sys_memfd_create+0x2a2/0x470 [ 163.553852] ? memfd_fcntl+0x1a50/0x1a50 [ 163.557957] ? do_syscall_64+0x26/0x620 [ 163.561951] ? lockdep_hardirqs_on+0x415/0x5d0 [ 163.566550] ? trace_hardirqs_on+0x67/0x220 [ 163.570901] do_syscall_64+0xfd/0x620 [ 163.574895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.580091] RIP: 0033:0x459879 [ 163.583328] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.602509] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 163.610243] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459879 [ 163.617700] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 163.625769] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 163.633053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 [ 163.640338] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 163.699724] [ 163.701380] ======================================================== [ 163.706204] kobject: 'loop5' (000000002bd82985): kobject_uevent_env [ 163.707868] WARNING: possible irq lock inversion dependency detected [ 163.707875] 4.19.69 #43 Not tainted [ 163.707878] -------------------------------------------------------- [ 163.707884] blkid/8371 just changed the state of lock: [ 163.707889] 00000000c56ceb48 ( [ 163.724623] kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 163.730854] &(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x490 [ 163.730879] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 163.730881] (&fiq->waitq){+.+.} [ 163.730889] [ 163.730889] [ 163.730889] and interrupts could create inverse lock ordering between them. [ 163.730889] [ 163.730892] [ 163.730892] other info that might help us debug this: [ 163.730895] Possible interrupt unsafe locking scenario: [ 163.730895] [ 163.730897] CPU0 CPU1 [ 163.730899] ---- ---- [ 163.730901] lock(&fiq->waitq); [ 163.730908] local_irq_disable(); [ 163.730910] lock(&(&ctx->ctx_lock)->rlock); [ 163.822017] lock(&fiq->waitq); [ 163.828255] [ 163.831021] lock(&(&ctx->ctx_lock)->rlock); [ 163.835776] [ 163.835776] *** DEADLOCK *** [ 163.835776] [ 163.841842] 3 locks held by blkid/8371: [ 163.845845] #0: 000000005222a1ac (rcu_read_lock){....}, at: avc_has_perm_noaudit+0xbf/0x570 [ 163.854619] #1: 00000000b4eaa202 (rcu_callback){....}, at: rcu_process_callbacks+0xc79/0x1a30 [ 163.863395] #2: 00000000e2949359 (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1ca/0x540 [ 163.873647] [ 163.873647] the shortest dependencies between 2nd lock and 1st lock: [ 163.881621] -> (&fiq->waitq){+.+.} ops: 21 { [ 163.886129] HARDIRQ-ON-W at: [ 163.889503] lock_acquire+0x16f/0x3f0 [ 163.895125] _raw_spin_lock+0x2f/0x40 [ 163.900851] flush_bg_queue+0x1f3/0x3d0 [ 163.906735] fuse_request_send_background_locked+0x26d/0x4e0 [ 163.915142] fuse_request_send_background+0x12b/0x180 [ 163.922161] fuse_fill_super+0x13b7/0x1720 [ 163.928570] mount_nodev+0x66/0x110 [ 163.934038] fuse_mount+0x2d/0x40 [ 163.939312] mount_fs+0xa8/0x31f [ 163.944508] vfs_kern_mount.part.0+0x6f/0x410 [ 163.950827] do_mount+0x53e/0x2bc0 [ 163.956196] ksys_mount+0xdb/0x150 [ 163.961649] __x64_sys_mount+0xbe/0x150 [ 163.967544] do_syscall_64+0xfd/0x620 [ 163.973172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.980173] SOFTIRQ-ON-W at: [ 163.983544] lock_acquire+0x16f/0x3f0 [ 163.989169] _raw_spin_lock+0x2f/0x40 [ 163.994797] flush_bg_queue+0x1f3/0x3d0 [ 164.000601] fuse_request_send_background_locked+0x26d/0x4e0 [ 164.008232] fuse_request_send_background+0x12b/0x180 [ 164.015427] fuse_fill_super+0x13b7/0x1720 [ 164.021491] mount_nodev+0x66/0x110 [ 164.026948] fuse_mount+0x2d/0x40 [ 164.032231] mount_fs+0xa8/0x31f [ 164.037451] vfs_kern_mount.part.0+0x6f/0x410 [ 164.043778] do_mount+0x53e/0x2bc0 [ 164.049138] ksys_mount+0xdb/0x150 [ 164.054503] __x64_sys_mount+0xbe/0x150 [ 164.060304] do_syscall_64+0xfd/0x620 [ 164.065930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.072939] INITIAL USE at: [ 164.076221] lock_acquire+0x16f/0x3f0 [ 164.081757] _raw_spin_lock+0x2f/0x40 [ 164.087291] flush_bg_queue+0x1f3/0x3d0 [ 164.093001] fuse_request_send_background_locked+0x26d/0x4e0 [ 164.100539] fuse_request_send_background+0x12b/0x180 [ 164.107819] fuse_fill_super+0x13b7/0x1720 [ 164.113998] mount_nodev+0x66/0x110 [ 164.119362] fuse_mount+0x2d/0x40 [ 164.124576] mount_fs+0xa8/0x31f [ 164.129677] vfs_kern_mount.part.0+0x6f/0x410 [ 164.136030] do_mount+0x53e/0x2bc0 [ 164.141313] ksys_mount+0xdb/0x150 [ 164.146593] __x64_sys_mount+0xbe/0x150 [ 164.152340] do_syscall_64+0xfd/0x620 [ 164.158414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.165337] } [ 164.167237] ... key at: [] __key.42211+0x0/0x40 [ 164.174061] ... acquired at: [ 164.177257] _raw_spin_lock+0x2f/0x40 [ 164.181230] io_submit_one+0xef2/0x2eb0 [ 164.185462] __x64_sys_io_submit+0x1aa/0x520 [ 164.190049] do_syscall_64+0xfd/0x620 [ 164.194092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.199447] [ 164.201067] -> (&(&ctx->ctx_lock)->rlock){..-.} ops: 3 { [ 164.206524] IN-SOFTIRQ-W at: [ 164.209900] lock_acquire+0x16f/0x3f0 [ 164.215356] _raw_spin_lock_irq+0x60/0x80 [ 164.221165] free_ioctx_users+0x2d/0x490 [ 164.226876] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 164.233977] rcu_process_callbacks+0xba0/0x1a30 [ 164.240297] __do_softirq+0x25c/0x921 [ 164.245961] irq_exit+0x180/0x1d0 [ 164.251069] smp_apic_timer_interrupt+0x13b/0x550 [ 164.257569] apic_timer_interrupt+0xf/0x20 [ 164.263456] write_comp_data+0x68/0x70 [ 164.268992] avc_has_perm_noaudit+0x1f6/0x570 [ 164.275225] selinux_inode_permission+0x431/0x6b0 [ 164.281719] security_inode_permission+0xb5/0x100 [ 164.288488] inode_permission+0x122/0x560 [ 164.294285] link_path_walk.part.0+0x9d6/0x1330 09:36:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) [ 164.300608] path_openat+0x1f9/0x45e0 [ 164.306066] do_filp_open+0x1a1/0x280 [ 164.311600] do_sys_open+0x3fe/0x550 [ 164.317046] __x64_sys_open+0x7e/0xc0 [ 164.322502] do_syscall_64+0xfd/0x620 [ 164.328045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.334965] INITIAL USE at: [ 164.338157] lock_acquire+0x16f/0x3f0 [ 164.343529] _raw_spin_lock_irq+0x60/0x80 [ 164.349512] io_submit_one+0xead/0x2eb0 [ 164.352990] kobject: 'nr0' (00000000ca1fbce5): kobject_add_internal: parent: 'net', set: 'devices' [ 164.355143] __x64_sys_io_submit+0x1aa/0x520 [ 164.355156] do_syscall_64+0xfd/0x620 [ 164.355177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.367689] kobject: 'nr0' (00000000ca1fbce5): kobject_uevent_env [ 164.371025] } [ 164.371043] ... key at: [] __key.50211+0x0/0x40 [ 164.371046] ... acquired at: [ 164.371056] mark_lock+0x420/0x1370 [ 164.371063] __lock_acquire+0xc62/0x49c0 [ 164.371071] lock_acquire+0x16f/0x3f0 [ 164.371082] _raw_spin_lock_irq+0x60/0x80 [ 164.371091] free_ioctx_users+0x2d/0x490 [ 164.371110] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 164.377130] kobject: 'nr0' (00000000ca1fbce5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 164.383301] rcu_process_callbacks+0xba0/0x1a30 [ 164.383317] __do_softirq+0x25c/0x921 [ 164.383329] irq_exit+0x180/0x1d0 [ 164.383339] smp_apic_timer_interrupt+0x13b/0x550 [ 164.383348] apic_timer_interrupt+0xf/0x20 [ 164.383358] write_comp_data+0x68/0x70 [ 164.383368] avc_has_perm_noaudit+0x1f6/0x570 [ 164.383379] selinux_inode_permission+0x431/0x6b0 [ 164.383387] security_inode_permission+0xb5/0x100 [ 164.383398] inode_permission+0x122/0x560 [ 164.383413] link_path_walk.part.0+0x9d6/0x1330 [ 164.425305] kobject: 'queues' (00000000947d9132): kobject_add_internal: parent: 'nr0', set: '' [ 164.427758] path_openat+0x1f9/0x45e0 [ 164.427768] do_filp_open+0x1a1/0x280 [ 164.427783] do_sys_open+0x3fe/0x550 [ 164.476677] kobject: 'queues' (00000000947d9132): kobject_uevent_env [ 164.477801] __x64_sys_open+0x7e/0xc0 [ 164.477814] do_syscall_64+0xfd/0x620 [ 164.477831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.487970] kobject: 'queues' (00000000947d9132): kobject_uevent_env: filter function caused the event to drop! [ 164.496320] [ 164.496324] [ 164.496324] stack backtrace: [ 164.496337] CPU: 1 PID: 8371 Comm: blkid Not tainted 4.19.69 #43 [ 164.496344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.496347] Call Trace: [ 164.496353] [ 164.496372] dump_stack+0x172/0x1f0 [ 164.496386] print_irq_inversion_bug.part.0+0x2c0/0x2cd [ 164.496397] check_usage_forwards.cold+0x20/0x29 [ 164.496407] ? check_usage_backwards+0x340/0x340 [ 164.496423] ? save_stack_trace+0x1a/0x20 [ 164.496432] ? save_trace+0xe0/0x290 [ 164.496446] mark_lock+0x420/0x1370 09:36:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 164.508084] kobject: 'rx-0' (000000001377fd31): kobject_add_internal: parent: 'queues', set: 'queues' [ 164.508255] ? check_usage_backwards+0x340/0x340 [ 164.515332] kobject: 'rx-0' (000000001377fd31): kobject_uevent_env [ 164.518778] __lock_acquire+0xc62/0x49c0 [ 164.518789] ? mark_held_locks+0x100/0x100 [ 164.518803] ? mark_held_locks+0x100/0x100 [ 164.518818] ? __wake_up_common_lock+0xfe/0x190 [ 164.525166] kobject: 'rx-0' (000000001377fd31): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 164.528121] ? mark_held_locks+0x100/0x100 [ 164.528133] ? __wake_up_common_lock+0xfe/0x190 [ 164.528150] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 164.539017] kobject: 'tx-0' (0000000064f1cafd): kobject_add_internal: parent: 'queues', set: 'queues' [ 164.540149] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 164.540162] ? trace_hardirqs_on+0x67/0x220 [ 164.540176] ? kasan_check_read+0x11/0x20 [ 164.540187] lock_acquire+0x16f/0x3f0 [ 164.540199] ? free_ioctx_users+0x2d/0x490 [ 164.540212] _raw_spin_lock_irq+0x60/0x80 [ 164.540222] ? free_ioctx_users+0x2d/0x490 [ 164.540231] free_ioctx_users+0x2d/0x490 [ 164.540251] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 164.547987] kobject: 'tx-0' (0000000064f1cafd): kobject_uevent_env [ 164.550955] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 164.550967] ? percpu_ref_exit+0xd0/0xd0 [ 164.550979] rcu_process_callbacks+0xba0/0x1a30 [ 164.550993] ? __rcu_read_unlock+0x170/0x170 [ 164.551003] ? __lock_is_held+0xb6/0x140 [ 164.551019] __do_softirq+0x25c/0x921 [ 164.551036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.577849] kobject: 'tx-0' (0000000064f1cafd): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 164.578954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 164.578973] irq_exit+0x180/0x1d0 [ 164.578992] smp_apic_timer_interrupt+0x13b/0x550 [ 164.619100] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 164.619797] apic_timer_interrupt+0xf/0x20 [ 164.619802] [ 164.619814] RIP: 0010:write_comp_data+0x68/0x70 [ 164.619826] Code: 00 00 4e 8d 14 dd 28 00 00 00 4d 39 d0 72 1b 49 83 c1 01 4a 89 7c 10 e0 4a 89 74 10 e8 4a 89 54 10 f0 4a 89 4c d8 20 4c 89 08 0f 1f 80 00 00 00 00 55 40 0f b6 d6 40 0f b6 f7 31 ff 48 89 e5 [ 164.619831] RSP: 0018:ffff88809f987788 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 164.619842] RAX: 0000000000000000 RBX: ffff888099b9bd28 RCX: ffffffff82e0a916 [ 164.619847] RDX: ffff888099b9bd28 RSI: 0000000000000000 RDI: 0000000000000007 [ 164.619860] RBP: ffff88809f987790 R08: ffff88806529c400 R09: ffffed1015d24733 [ 164.624106] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.628311] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000027 [ 164.852889] R13: 0000000000000008 R14: 000000000000000b R15: dffffc0000000000 [ 164.860267] ? avc_has_perm_noaudit+0x1f6/0x570 [ 164.865036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 164.870606] avc_has_perm_noaudit+0x1f6/0x570 [ 164.875106] ? avc_has_extended_perms+0x10f0/0x10f0 [ 164.880130] ? __might_sleep+0x95/0x190 [ 164.884197] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 164.889737] selinux_inode_permission+0x431/0x6b0 [ 164.894592] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 164.899434] ? selinux_capable+0x40/0x40 [ 164.907984] ? wait_for_completion+0x440/0x440 [ 164.912592] ? set_nlink+0xb3/0x140 [ 164.916232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.921771] security_inode_permission+0xb5/0x100 [ 164.926613] inode_permission+0x122/0x560 [ 164.930765] link_path_walk.part.0+0x9d6/0x1330 [ 164.935531] ? walk_component+0x2000/0x2000 [ 164.939864] path_openat+0x1f9/0x45e0 [ 164.943665] ? __lock_acquire+0x6ee/0x49c0 [ 164.947910] ? getname+0x1a/0x20 [ 164.951284] ? do_sys_open+0x2c9/0x550 [ 164.955184] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 164.959941] ? __lock_is_held+0xb6/0x140 [ 164.964007] ? __alloc_fd+0x44d/0x560 [ 164.967823] do_filp_open+0x1a1/0x280 [ 164.971628] ? may_open_dev+0x100/0x100 [ 164.975789] ? kasan_check_read+0x11/0x20 [ 164.979965] ? do_raw_spin_unlock+0x57/0x270 [ 164.984370] ? _raw_spin_unlock+0x2d/0x50 [ 164.988516] ? __alloc_fd+0x44d/0x560 [ 164.992411] do_sys_open+0x3fe/0x550 [ 164.996209] ? filp_open+0x80/0x80 [ 164.999751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 165.004506] ? do_syscall_64+0x26/0x620 [ 165.008477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.013849] ? do_syscall_64+0x26/0x620 [ 165.017829] __x64_sys_open+0x7e/0xc0 [ 165.021632] do_syscall_64+0xfd/0x620 [ 165.025434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.030709] RIP: 0033:0x7fc5efde7120 [ 165.034424] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 165.053425] RSP: 002b:00007ffcaad12cd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 165.061135] RAX: ffffffffffffffda RBX: 00007ffcaad13d20 RCX: 00007fc5efde7120 [ 165.068406] RDX: 00007ffcaad12cf2 RSI: 0000000000000000 RDI: 00007ffcaad12ce0 [ 165.075773] RBP: 0000000000000703 R08: 0000000000000000 R09: 0000000000000001 [ 165.083042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcaad14d98 [ 165.090316] R13: 0000000000000000 R14: 00007fc5f02c8820 R15: 00007fc5f00be2a2 [ 165.133616] FAULT_INJECTION: forcing a failure. [ 165.133616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 165.145460] CPU: 1 PID: 8388 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 165.152392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.161870] Call Trace: [ 165.164484] dump_stack+0x172/0x1f0 [ 165.168125] should_fail.cold+0xa/0x1b [ 165.172025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 165.177134] ? lock_downgrade+0x810/0x810 [ 165.181377] ? mark_held_locks+0x100/0x100 [ 165.185728] __alloc_pages_nodemask+0x1ee/0x750 [ 165.190411] ? __alloc_pages_slowpath+0x2870/0x2870 [ 165.195439] ? timespec64_trunc+0xf0/0x180 [ 165.199675] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 165.204786] cache_grow_begin+0x91/0x8c0 [ 165.208855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 165.214409] ? check_preemption_disabled+0x48/0x290 [ 165.219429] kmem_cache_alloc+0x63b/0x700 [ 165.223717] ? notify_change+0x6d5/0xfb0 [ 165.227843] getname_flags+0xd6/0x5b0 [ 165.231654] getname+0x1a/0x20 [ 165.234850] do_sys_open+0x2c9/0x550 [ 165.238563] ? filp_open+0x80/0x80 [ 165.242123] ? fput+0x128/0x1a0 [ 165.245419] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 165.251048] __x64_sys_open+0x7e/0xc0 [ 165.254858] do_syscall_64+0xfd/0x620 [ 165.258669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.263869] RIP: 0033:0x413761 09:36:49 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:36:49 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 165.267063] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 165.286408] RSP: 002b:00007f3450f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 165.294134] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413761 [ 165.301665] RDX: 00007f3450f77b0a RSI: 0000000000000002 RDI: 00007f3450f77b00 [ 165.309115] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 165.316387] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 165.323768] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 165.335681] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 165.342208] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.352277] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 165.358732] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' 09:36:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 165.387433] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 165.393959] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.404821] hfs: session requires an argument [ 165.409425] hfs: unable to parse mount options [ 165.423532] kobject: 'rx-0' (000000001377fd31): kobject_cleanup, parent 00000000947d9132 [ 165.439679] kobject: 'rx-0' (000000001377fd31): auto cleanup 'remove' event [ 165.446947] kobject: 'rx-0' (000000001377fd31): kobject_uevent_env [ 165.454075] kobject: 'rx-0' (000000001377fd31): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 165.464551] kobject: 'rx-0' (000000001377fd31): auto cleanup kobject_del [ 165.471449] kobject: 'rx-0' (000000001377fd31): calling ktype release [ 165.478028] kobject: 'rx-0': free name [ 165.482020] kobject: 'tx-0' (0000000064f1cafd): kobject_cleanup, parent 00000000947d9132 [ 165.490277] kobject: 'tx-0' (0000000064f1cafd): auto cleanup 'remove' event [ 165.497374] kobject: 'tx-0' (0000000064f1cafd): kobject_uevent_env [ 165.503785] kobject: 'tx-0' (0000000064f1cafd): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 165.514032] kobject: 'tx-0' (0000000064f1cafd): auto cleanup kobject_del [ 165.520972] kobject: 'tx-0' (0000000064f1cafd): calling ktype release [ 165.527641] kobject: 'tx-0': free name [ 165.531589] kobject: 'queues' (00000000947d9132): kobject_cleanup, parent (null) [ 165.540024] kobject: 'queues' (00000000947d9132): calling ktype release [ 165.546783] kobject: 'queues' (00000000947d9132): kset_release [ 165.552802] kobject: 'queues': free name [ 165.557312] kobject: 'nr0' (00000000ca1fbce5): kobject_uevent_env [ 165.563705] kobject: 'nr0' (00000000ca1fbce5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 165.573037] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 165.579886] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' 09:36:50 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 165.604886] kobject: 'loop0' (000000002acb91e0): kobject_uevent_env [ 165.611493] kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.649091] kobject: 'nr0' (00000000ca1fbce5): kobject_cleanup, parent (null) [ 165.651986] FAULT_INJECTION: forcing a failure. [ 165.651986] name failslab, interval 1, probability 0, space 0, times 0 [ 165.657581] kobject: 'nr0' (00000000ca1fbce5): calling ktype release [ 165.675721] kobject: 'nr0': free name [ 165.729743] CPU: 1 PID: 8398 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 165.740819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.750628] Call Trace: [ 165.753237] dump_stack+0x172/0x1f0 [ 165.756870] should_fail.cold+0xa/0x1b [ 165.760763] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 165.765873] ? lock_downgrade+0x810/0x810 [ 165.770032] ? set_page_refcounted+0x100/0x100 [ 165.774636] __should_failslab+0x121/0x190 [ 165.778898] should_failslab+0x9/0x14 [ 165.782740] kmem_cache_alloc+0x2ae/0x700 [ 165.786901] ? __save_stack_trace+0x99/0x100 [ 165.791320] __alloc_file+0x27/0x330 [ 165.795041] alloc_empty_file+0x72/0x170 [ 165.799102] path_openat+0xef/0x45e0 [ 165.802848] ? kasan_kmalloc+0xce/0xf0 [ 165.806747] ? kasan_slab_alloc+0xf/0x20 [ 165.810865] ? kmem_cache_alloc+0x12e/0x700 [ 165.815200] ? getname_flags+0xd6/0x5b0 [ 165.819185] ? getname+0x1a/0x20 [ 165.822561] ? do_sys_open+0x2c9/0x550 [ 165.826457] ? __x64_sys_open+0x7e/0xc0 09:36:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x2, &(0x7f0000000100)) [ 165.830440] ? do_syscall_64+0xfd/0x620 [ 165.834418] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.839779] ? lock_downgrade+0x810/0x810 [ 165.843957] ? mark_held_locks+0x100/0x100 [ 165.848202] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 165.852973] ? mark_held_locks+0x100/0x100 [ 165.857212] ? __alloc_pages_nodemask+0x377/0x750 [ 165.862148] ? __alloc_pages_slowpath+0x2870/0x2870 [ 165.866064] kobject: 'loop5' (000000002bd82985): kobject_uevent_env [ 165.867271] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 165.878759] do_filp_open+0x1a1/0x280 [ 165.882581] ? may_open_dev+0x100/0x100 [ 165.886667] ? do_dup2+0x450/0x450 [ 165.887986] kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 165.890224] ? lock_downgrade+0x810/0x810 [ 165.890240] ? kasan_check_read+0x11/0x20 [ 165.890252] ? do_raw_spin_unlock+0x57/0x270 [ 165.890264] ? _raw_spin_unlock+0x2d/0x50 [ 165.890276] ? __alloc_fd+0x44d/0x560 [ 165.890294] do_sys_open+0x3fe/0x550 [ 165.890305] ? filp_open+0x80/0x80 [ 165.890320] ? fput+0x128/0x1a0 [ 165.926357] kobject: 'nr0' (00000000af1079b5): kobject_add_internal: parent: 'net', set: 'devices' [ 165.927770] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 165.927789] __x64_sys_open+0x7e/0xc0 [ 165.949399] do_syscall_64+0xfd/0x620 [ 165.953213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.958519] RIP: 0033:0x413761 [ 165.961723] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 09:36:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 165.975276] kobject: 'nr0' (00000000af1079b5): kobject_uevent_env [ 165.980799] RSP: 002b:00007f3450f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 165.980814] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413761 [ 165.980821] RDX: 00007f3450f77b0a RSI: 0000000000000002 RDI: 00007f3450f77b00 [ 165.980828] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 165.980834] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 165.980840] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 165.999302] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 166.043015] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 166.056593] kobject: 'nr0' (00000000af1079b5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 166.066039] kobject: 'queues' (00000000bec9c0d7): kobject_add_internal: parent: 'nr0', set: '' 09:36:50 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 166.075641] kobject: 'queues' (00000000bec9c0d7): kobject_uevent_env [ 166.082236] kobject: 'queues' (00000000bec9c0d7): kobject_uevent_env: filter function caused the event to drop! [ 166.092818] kobject: 'rx-0' (0000000095d20a12): kobject_add_internal: parent: 'queues', set: 'queues' [ 166.102416] kobject: 'rx-0' (0000000095d20a12): kobject_uevent_env [ 166.108856] kobject: 'rx-0' (0000000095d20a12): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 166.119172] kobject: 'tx-0' (00000000e6a4ae36): kobject_add_internal: parent: 'queues', set: 'queues' [ 166.128801] kobject: 'tx-0' (00000000e6a4ae36): kobject_uevent_env [ 166.135267] kobject: 'tx-0' (00000000e6a4ae36): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 166.147433] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 166.156529] kobject: 'rx-0' (0000000095d20a12): kobject_cleanup, parent 00000000bec9c0d7 [ 166.164902] kobject: 'rx-0' (0000000095d20a12): auto cleanup 'remove' event [ 166.172259] kobject: 'rx-0' (0000000095d20a12): kobject_uevent_env [ 166.178688] kobject: 'rx-0' (0000000095d20a12): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 166.189040] kobject: 'rx-0' (0000000095d20a12): auto cleanup kobject_del [ 166.195958] kobject: 'rx-0' (0000000095d20a12): calling ktype release [ 166.202691] kobject: 'rx-0': free name [ 166.206624] kobject: 'tx-0' (00000000e6a4ae36): kobject_cleanup, parent 00000000bec9c0d7 [ 166.213410] FAULT_INJECTION: forcing a failure. [ 166.213410] name failslab, interval 1, probability 0, space 0, times 0 [ 166.215016] kobject: 'tx-0' (00000000e6a4ae36): auto cleanup 'remove' event [ 166.233418] kobject: 'tx-0' (00000000e6a4ae36): kobject_uevent_env [ 166.239808] kobject: 'tx-0' (00000000e6a4ae36): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 166.250059] kobject: 'tx-0' (00000000e6a4ae36): auto cleanup kobject_del [ 166.257027] kobject: 'tx-0' (00000000e6a4ae36): calling ktype release [ 166.258137] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.263659] kobject: 'tx-0': free name 09:36:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 166.263684] kobject: 'queues' (00000000bec9c0d7): kobject_cleanup, parent (null) [ 166.263690] kobject: 'queues' (00000000bec9c0d7): calling ktype release [ 166.263697] kobject: 'queues' (00000000bec9c0d7): kset_release [ 166.263706] kobject: 'queues': free name [ 166.303074] kobject: 'nr0' (00000000af1079b5): kobject_uevent_env [ 166.309430] kobject: 'nr0' (00000000af1079b5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 166.339662] CPU: 1 PID: 8411 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 166.346782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.356141] Call Trace: [ 166.358754] dump_stack+0x172/0x1f0 [ 166.362401] should_fail.cold+0xa/0x1b [ 166.366304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 166.370368] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 166.372107] ? lock_downgrade+0x810/0x810 [ 166.372126] ? set_page_refcounted+0x100/0x100 [ 166.378717] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.382859] __should_failslab+0x121/0x190 [ 166.382872] should_failslab+0x9/0x14 [ 166.382883] kmem_cache_alloc+0x2ae/0x700 [ 166.382894] ? kasan_kmalloc+0xce/0xf0 [ 166.382910] selinux_file_alloc_security+0xb4/0x190 [ 166.382922] security_file_alloc+0x63/0xa0 [ 166.382936] __alloc_file+0xcf/0x330 [ 166.382952] alloc_empty_file+0x72/0x170 [ 166.430063] path_openat+0xef/0x45e0 [ 166.433825] ? kasan_kmalloc+0xce/0xf0 [ 166.437820] ? kasan_slab_alloc+0xf/0x20 [ 166.441992] ? kmem_cache_alloc+0x12e/0x700 [ 166.446334] ? getname_flags+0xd6/0x5b0 [ 166.450323] ? getname+0x1a/0x20 [ 166.453695] ? do_sys_open+0x2c9/0x550 [ 166.457587] ? __x64_sys_open+0x7e/0xc0 [ 166.461596] ? do_syscall_64+0xfd/0x620 [ 166.465579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.470956] ? lock_downgrade+0x810/0x810 [ 166.475113] ? mark_held_locks+0x100/0x100 [ 166.479373] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 166.484138] ? mark_held_locks+0x100/0x100 [ 166.488561] ? __alloc_pages_nodemask+0x377/0x750 [ 166.493421] ? __alloc_pages_slowpath+0x2870/0x2870 [ 166.498544] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 166.503664] do_filp_open+0x1a1/0x280 [ 166.507472] ? may_open_dev+0x100/0x100 [ 166.511451] ? do_dup2+0x450/0x450 [ 166.514997] ? lock_downgrade+0x810/0x810 [ 166.519157] ? kasan_check_read+0x11/0x20 [ 166.523312] ? do_raw_spin_unlock+0x57/0x270 [ 166.527821] ? _raw_spin_unlock+0x2d/0x50 [ 166.531993] ? __alloc_fd+0x44d/0x560 [ 166.535822] do_sys_open+0x3fe/0x550 [ 166.539637] ? filp_open+0x80/0x80 [ 166.543382] ? fput+0x128/0x1a0 [ 166.546669] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 166.552041] __x64_sys_open+0x7e/0xc0 [ 166.555853] do_syscall_64+0xfd/0x620 [ 166.559660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.564849] RIP: 0033:0x413761 [ 166.568161] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 166.587084] RSP: 002b:00007f3450f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 166.594860] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413761 [ 166.602130] RDX: 00007f3450f77b0a RSI: 0000000000000002 RDI: 00007f3450f77b00 [ 166.609408] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 166.616680] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 166.624481] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:51 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 166.639921] kobject: 'nr0' (00000000af1079b5): kobject_cleanup, parent (null) [ 166.654218] kobject: 'nr0' (00000000af1079b5): calling ktype release [ 166.673983] kobject: 'nr0': free name [ 166.681483] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 166.688427] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.707839] kobject: 'nr0' (0000000041be2318): kobject_add_internal: parent: 'net', set: 'devices' [ 166.729894] FAULT_INJECTION: forcing a failure. [ 166.729894] name failslab, interval 1, probability 0, space 0, times 0 [ 166.744461] kobject: 'nr0' (0000000041be2318): kobject_uevent_env [ 166.755398] kobject: 'nr0' (0000000041be2318): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 166.771814] CPU: 1 PID: 8419 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 166.778866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.788228] Call Trace: [ 166.790828] dump_stack+0x172/0x1f0 [ 166.794465] should_fail.cold+0xa/0x1b [ 166.798354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 166.803462] ? lock_downgrade+0x810/0x810 [ 166.807789] ? set_page_refcounted+0x100/0x100 [ 166.812385] __should_failslab+0x121/0x190 [ 166.816623] should_failslab+0x9/0x14 [ 166.820722] kmem_cache_alloc_trace+0x2cc/0x760 [ 166.825488] ? __lockdep_init_map+0x10c/0x5b0 [ 166.829990] ? loop_info64_to_compat+0x6d0/0x6d0 [ 166.834749] __kthread_create_on_node+0xf2/0x460 [ 166.839508] ? lock_acquire+0x16f/0x3f0 [ 166.843488] ? __kthread_parkme+0x1b0/0x1b0 [ 166.847815] ? lo_ioctl+0x1c4/0x20e0 [ 166.851528] ? lock_downgrade+0x810/0x810 [ 166.855681] ? mutex_trylock+0x1e0/0x1e0 [ 166.859740] ? loop_info64_to_compat+0x6d0/0x6d0 [ 166.864497] kthread_create_on_node+0xbb/0xf0 [ 166.869086] ? __kthread_create_on_node+0x460/0x460 [ 166.874103] ? __lockdep_init_map+0x10c/0x5b0 [ 166.878601] ? __lockdep_init_map+0x10c/0x5b0 [ 166.883365] lo_ioctl+0xaf2/0x20e0 [ 166.886913] ? lo_rw_aio+0x1470/0x1470 [ 166.890861] blkdev_ioctl+0xc38/0x1ab6 [ 166.894746] ? blkpg_ioctl+0xa90/0xa90 [ 166.898629] ? mark_held_locks+0x100/0x100 [ 166.902874] ? __alloc_pages_slowpath+0x2870/0x2870 [ 166.907989] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 166.913096] ? lock_downgrade+0x810/0x810 [ 166.917516] block_ioctl+0xee/0x130 [ 166.921232] ? blkdev_fallocate+0x410/0x410 [ 166.925729] do_vfs_ioctl+0xd5f/0x1380 [ 166.929716] ? selinux_file_ioctl+0x46f/0x5e0 [ 166.934211] ? selinux_file_ioctl+0x125/0x5e0 [ 166.938800] ? ioctl_preallocate+0x210/0x210 [ 166.943217] ? selinux_file_mprotect+0x620/0x620 [ 166.947980] ? iterate_fd+0x360/0x360 [ 166.951785] ? do_sys_open+0x31d/0x550 [ 166.955679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.961229] ? security_file_ioctl+0x8d/0xc0 [ 166.965741] ksys_ioctl+0xab/0xd0 [ 166.969196] __x64_sys_ioctl+0x73/0xb0 [ 166.973083] do_syscall_64+0xfd/0x620 [ 166.976884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.982105] RIP: 0033:0x4596e7 [ 166.985303] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.004314] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.012024] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 167.019385] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 167.026692] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 167.033973] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 09:36:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 167.041256] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 167.065996] kobject: 'queues' (00000000fe7dde3d): kobject_add_internal: parent: 'nr0', set: '' [ 167.080535] kobject: 'queues' (00000000fe7dde3d): kobject_uevent_env 09:36:51 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 167.087559] kobject: 'queues' (00000000fe7dde3d): kobject_uevent_env: filter function caused the event to drop! [ 167.108100] kobject: 'rx-0' (00000000d59e0917): kobject_add_internal: parent: 'queues', set: 'queues' [ 167.127952] kobject: 'rx-0' (00000000d59e0917): kobject_uevent_env [ 167.153751] kobject: 'rx-0' (00000000d59e0917): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 167.173775] kobject: 'tx-0' (000000003e053685): kobject_add_internal: parent: 'queues', set: 'queues' [ 167.185551] kobject: 'tx-0' (000000003e053685): kobject_uevent_env [ 167.192205] kobject: 'tx-0' (000000003e053685): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 167.206732] kobject: 'rx-0' (00000000d59e0917): kobject_cleanup, parent 00000000fe7dde3d [ 167.225447] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 167.247195] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 167.267319] kobject: 'rx-0' (00000000d59e0917): auto cleanup 'remove' event [ 167.287267] kobject: 'rx-0' (00000000d59e0917): kobject_uevent_env [ 167.296807] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 167.316267] kobject: 'rx-0' (00000000d59e0917): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 167.327893] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 167.352364] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 167.359397] kobject: 'rx-0' (00000000d59e0917): auto cleanup kobject_del [ 167.378441] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 167.392960] kobject: 'rx-0' (00000000d59e0917): calling ktype release 09:36:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:52 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 167.413494] kobject: 'rx-0': free name [ 167.426855] kobject: 'tx-0' (000000003e053685): kobject_cleanup, parent 00000000fe7dde3d [ 167.459426] FAULT_INJECTION: forcing a failure. [ 167.459426] name failslab, interval 1, probability 0, space 0, times 0 [ 167.462835] kobject: 'tx-0' (000000003e053685): auto cleanup 'remove' event [ 167.477922] kobject: 'tx-0' (000000003e053685): kobject_uevent_env [ 167.484435] kobject: 'tx-0' (000000003e053685): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 167.489788] CPU: 1 PID: 8434 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 167.495269] kobject: 'tx-0' (000000003e053685): auto cleanup kobject_del [ 167.501791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.501796] Call Trace: [ 167.501820] dump_stack+0x172/0x1f0 [ 167.501838] should_fail.cold+0xa/0x1b [ 167.501858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 167.508719] kobject: 'tx-0' (000000003e053685): calling ktype release [ 167.518250] ? lock_downgrade+0x810/0x810 [ 167.518264] ? set_page_refcounted+0x100/0x100 [ 167.518280] __should_failslab+0x121/0x190 [ 167.518300] should_failslab+0x9/0x14 [ 167.520927] kobject: 'tx-0': free name [ 167.524590] kmem_cache_alloc_trace+0x2cc/0x760 [ 167.528497] kobject: 'queues' (00000000fe7dde3d): kobject_cleanup, parent (null) [ 167.533566] ? __lockdep_init_map+0x10c/0x5b0 [ 167.533582] ? loop_info64_to_compat+0x6d0/0x6d0 [ 167.533597] __kthread_create_on_node+0xf2/0x460 [ 167.533606] ? lock_acquire+0x16f/0x3f0 [ 167.533622] ? __kthread_parkme+0x1b0/0x1b0 [ 167.540476] kobject: 'queues' (00000000fe7dde3d): calling ktype release [ 167.544309] ? lo_ioctl+0x1c4/0x20e0 [ 167.548882] kobject: 'queues' (00000000fe7dde3d): kset_release [ 167.553123] ? lock_downgrade+0x810/0x810 [ 167.553140] ? mutex_trylock+0x1e0/0x1e0 [ 167.553156] ? loop_info64_to_compat+0x6d0/0x6d0 [ 167.556943] kobject: 'queues': free name [ 167.560901] kthread_create_on_node+0xbb/0xf0 [ 167.560915] ? __kthread_create_on_node+0x460/0x460 [ 167.560928] ? __lockdep_init_map+0x10c/0x5b0 [ 167.560945] ? __lockdep_init_map+0x10c/0x5b0 [ 167.565915] kobject: 'nr0' (0000000041be2318): kobject_uevent_env [ 167.573999] lo_ioctl+0xaf2/0x20e0 [ 167.574015] ? lo_rw_aio+0x1470/0x1470 [ 167.574032] blkdev_ioctl+0xc38/0x1ab6 [ 167.578533] kobject: 'nr0' (0000000041be2318): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 167.583442] ? blkpg_ioctl+0xa90/0xa90 [ 167.583452] ? mark_held_locks+0x100/0x100 [ 167.583464] ? __alloc_pages_slowpath+0x2870/0x2870 [ 167.583476] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 167.583491] ? lock_downgrade+0x810/0x810 [ 167.697474] block_ioctl+0xee/0x130 [ 167.701139] ? blkdev_fallocate+0x410/0x410 [ 167.705453] do_vfs_ioctl+0xd5f/0x1380 [ 167.709329] ? selinux_file_ioctl+0x46f/0x5e0 [ 167.713812] ? selinux_file_ioctl+0x125/0x5e0 [ 167.718315] ? ioctl_preallocate+0x210/0x210 [ 167.722731] ? selinux_file_mprotect+0x620/0x620 [ 167.727483] ? iterate_fd+0x360/0x360 [ 167.731374] ? do_sys_open+0x31d/0x550 [ 167.739600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 167.745270] ? security_file_ioctl+0x8d/0xc0 [ 167.749698] ksys_ioctl+0xab/0xd0 [ 167.753141] __x64_sys_ioctl+0x73/0xb0 [ 167.757015] do_syscall_64+0xfd/0x620 [ 167.760809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.766168] RIP: 0033:0x4596e7 [ 167.769351] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.788431] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.796241] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 167.803605] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 09:36:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 167.810867] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 167.818118] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 167.825380] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 167.838813] kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env [ 167.848101] kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' 09:36:52 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 167.867420] kobject: 'nr0' (0000000041be2318): kobject_cleanup, parent (null) [ 167.873092] kobject: 'loop0' (000000002acb91e0): kobject_uevent_env [ 167.881329] kobject: 'nr0' (0000000041be2318): calling ktype release [ 167.892343] kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 167.898830] kobject: 'nr0': free name [ 167.905567] FAULT_INJECTION: forcing a failure. [ 167.905567] name failslab, interval 1, probability 0, space 0, times 0 09:36:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x4b47, &(0x7f0000000100)) [ 167.923000] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 167.929932] CPU: 1 PID: 8441 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 167.936879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.946251] Call Trace: [ 167.948862] dump_stack+0x172/0x1f0 [ 167.952514] should_fail.cold+0xa/0x1b [ 167.956418] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 167.961547] ? lock_downgrade+0x810/0x810 [ 167.965807] ? set_page_refcounted+0x100/0x100 [ 167.970404] __should_failslab+0x121/0x190 [ 167.970716] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 167.974725] should_failslab+0x9/0x14 [ 167.974738] kmem_cache_alloc+0x2ae/0x700 [ 167.974756] __kernfs_new_node+0xef/0x680 [ 167.996354] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 168.001122] ? kasan_check_read+0x11/0x20 [ 168.005283] ? _raw_spin_unlock_irq+0x5e/0x90 [ 168.009788] ? __schedule+0x1495/0x1dc0 [ 168.013775] kernfs_new_node+0x99/0x130 [ 168.017870] kernfs_create_dir_ns+0x52/0x160 [ 168.022288] internal_create_group+0x1cb/0xc30 [ 168.026884] ? trace_hardirqs_on+0x5e/0x220 [ 168.031241] ? remove_files.isra.0+0x190/0x190 [ 168.036007] ? bd_set_size+0x3f/0xb0 [ 168.039731] sysfs_create_group+0x20/0x30 [ 168.043888] lo_ioctl+0xf8f/0x20e0 [ 168.047433] ? lo_rw_aio+0x1470/0x1470 [ 168.051321] blkdev_ioctl+0xc38/0x1ab6 [ 168.055212] ? blkpg_ioctl+0xa90/0xa90 [ 168.059098] ? mark_held_locks+0x100/0x100 [ 168.063334] ? __alloc_pages_slowpath+0x2870/0x2870 [ 168.068443] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 168.073464] ? lock_downgrade+0x810/0x810 [ 168.077709] block_ioctl+0xee/0x130 [ 168.081335] ? blkdev_fallocate+0x410/0x410 [ 168.085657] do_vfs_ioctl+0xd5f/0x1380 [ 168.089546] ? selinux_file_ioctl+0x46f/0x5e0 [ 168.094039] ? selinux_file_ioctl+0x125/0x5e0 [ 168.098539] ? ioctl_preallocate+0x210/0x210 [ 168.103187] ? selinux_file_mprotect+0x620/0x620 [ 168.107951] ? iterate_fd+0x360/0x360 [ 168.111751] ? do_sys_open+0x31d/0x550 [ 168.115653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 168.121196] ? security_file_ioctl+0x8d/0xc0 [ 168.125609] ksys_ioctl+0xab/0xd0 [ 168.129077] __x64_sys_ioctl+0x73/0xb0 [ 168.132968] do_syscall_64+0xfd/0x620 [ 168.136772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.141961] RIP: 0033:0x4596e7 [ 168.145157] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.164158] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:36:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:36:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 168.171876] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 168.179235] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 168.186504] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 168.193775] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 168.201074] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 168.245436] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 168.252195] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 168.289429] kobject: 'loop5' (000000002bd82985): kobject_uevent_env [ 168.298888] kobject: 'nr0' (000000003feb6783): kobject_add_internal: parent: 'net', set: 'devices' [ 168.314169] hfs: session requires an argument [ 168.321229] kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 168.341545] hfs: unable to parse mount options [ 168.354665] kobject: 'nr0' (000000003feb6783): kobject_uevent_env [ 168.362439] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 168.369304] kobject: 'nr0' (000000003feb6783): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 168.379782] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 168.391002] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 168.398220] kobject: 'queues' (00000000e35ac261): kobject_add_internal: parent: 'nr0', set: '' [ 168.407927] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 168.415078] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 168.425239] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 168.435494] kobject: 'queues' (00000000e35ac261): kobject_uevent_env [ 168.449808] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 168.463324] kobject: 'queues' (00000000e35ac261): kobject_uevent_env: filter function caused the event to drop! [ 168.486124] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' 09:36:53 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 168.506667] kobject: 'rx-0' (00000000da4c64cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 168.532260] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 168.550918] FAULT_INJECTION: forcing a failure. [ 168.550918] name failslab, interval 1, probability 0, space 0, times 0 [ 168.563716] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 168.573840] kobject: 'rx-0' (00000000da4c64cf): kobject_uevent_env [ 168.580691] kobject: 'rx-0' (00000000da4c64cf): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 168.602099] CPU: 1 PID: 8462 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 168.609063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.618427] Call Trace: [ 168.621041] dump_stack+0x172/0x1f0 [ 168.624697] should_fail.cold+0xa/0x1b [ 168.628597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 168.633709] ? lock_downgrade+0x810/0x810 [ 168.637886] ? set_page_refcounted+0x100/0x100 [ 168.642486] __should_failslab+0x121/0x190 [ 168.646732] should_failslab+0x9/0x14 [ 168.649960] kobject: 'tx-0' (000000004a99aaef): kobject_add_internal: parent: 'queues', set: 'queues' [ 168.650543] kmem_cache_alloc+0x2ae/0x700 [ 168.650560] __kernfs_new_node+0xef/0x680 [ 168.660225] kobject: 'tx-0' (000000004a99aaef): kobject_uevent_env [ 168.664124] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 168.664139] ? lock_downgrade+0x810/0x810 [ 168.668313] kobject: 'tx-0' (000000004a99aaef): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 168.674561] ? kasan_check_write+0x14/0x20 [ 168.674577] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 168.674591] ? wait_for_completion+0x440/0x440 [ 168.674608] kernfs_new_node+0x99/0x130 [ 168.711536] __kernfs_create_file+0x51/0x33b [ 168.716083] sysfs_add_file_mode_ns+0x222/0x560 [ 168.720855] internal_create_group+0x383/0xc30 [ 168.725458] ? remove_files.isra.0+0x190/0x190 [ 168.730043] ? bd_set_size+0x3f/0xb0 [ 168.733770] sysfs_create_group+0x20/0x30 [ 168.738009] lo_ioctl+0xf8f/0x20e0 [ 168.741582] ? lo_rw_aio+0x1470/0x1470 [ 168.745473] blkdev_ioctl+0xc38/0x1ab6 [ 168.749363] ? blkpg_ioctl+0xa90/0xa90 [ 168.753253] ? mark_held_locks+0x100/0x100 [ 168.757534] ? __alloc_pages_slowpath+0x2870/0x2870 [ 168.762573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 168.767770] ? lock_downgrade+0x810/0x810 [ 168.771926] block_ioctl+0xee/0x130 [ 168.775556] ? blkdev_fallocate+0x410/0x410 [ 168.779920] do_vfs_ioctl+0xd5f/0x1380 [ 168.783823] ? selinux_file_ioctl+0x46f/0x5e0 [ 168.788316] ? selinux_file_ioctl+0x125/0x5e0 [ 168.792820] ? ioctl_preallocate+0x210/0x210 [ 168.797234] ? selinux_file_mprotect+0x620/0x620 [ 168.802693] ? iterate_fd+0x360/0x360 [ 168.806502] ? do_sys_open+0x31d/0x550 [ 168.810483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 168.816023] ? security_file_ioctl+0x8d/0xc0 [ 168.820434] ksys_ioctl+0xab/0xd0 [ 168.823987] __x64_sys_ioctl+0x73/0xb0 [ 168.827885] do_syscall_64+0xfd/0x620 [ 168.831782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.837231] RIP: 0033:0x4596e7 [ 168.840426] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.859338] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 168.867058] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 168.874355] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 168.881730] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 168.889125] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 168.896599] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 168.910688] kobject: 'rx-0' (00000000da4c64cf): kobject_cleanup, parent 00000000e35ac261 [ 168.915448] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 168.929315] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 168.943153] kobject: 'rx-0' (00000000da4c64cf): auto cleanup 'remove' event 09:36:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 168.956777] hfs: session requires an argument [ 168.956885] kobject: 'rx-0' (00000000da4c64cf): kobject_uevent_env [ 168.963053] kobject: 'loop0' (000000002acb91e0): kobject_uevent_env [ 168.969718] kobject: 'rx-0' (00000000da4c64cf): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 168.989993] kobject: 'rx-0' (00000000da4c64cf): auto cleanup kobject_del [ 168.993751] hfs: unable to parse mount options [ 168.997235] kobject: 'rx-0' (00000000da4c64cf): calling ktype release [ 169.007152] kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 169.008442] kobject: 'rx-0': free name [ 169.022321] kobject: 'tx-0' (000000004a99aaef): kobject_cleanup, parent 00000000e35ac261 [ 169.033744] kobject: 'tx-0' (000000004a99aaef): auto cleanup 'remove' event [ 169.035478] kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env [ 169.049934] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 169.057687] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 169.059538] kobject: 'tx-0' (000000004a99aaef): kobject_uevent_env [ 169.073322] kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' 09:36:53 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 169.103847] kobject: 'tx-0' (000000004a99aaef): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 169.139883] kobject: 'tx-0' (000000004a99aaef): auto cleanup kobject_del 09:36:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 169.170834] kobject: 'tx-0' (000000004a99aaef): calling ktype release [ 169.187907] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 169.194842] kobject: 'tx-0': free name [ 169.207809] kobject: 'queues' (00000000e35ac261): kobject_cleanup, parent (null) [ 169.208514] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 169.235708] kobject: 'queues' (00000000e35ac261): calling ktype release [ 169.255096] FAULT_INJECTION: forcing a failure. [ 169.255096] name failslab, interval 1, probability 0, space 0, times 0 [ 169.266616] CPU: 1 PID: 8481 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 169.273577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.282944] Call Trace: [ 169.284403] kobject: 'queues' (00000000e35ac261): kset_release [ 169.285598] dump_stack+0x172/0x1f0 [ 169.285619] should_fail.cold+0xa/0x1b [ 169.299193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 169.304305] ? lock_downgrade+0x810/0x810 [ 169.308477] ? set_page_refcounted+0x100/0x100 [ 169.313071] __should_failslab+0x121/0x190 [ 169.317428] should_failslab+0x9/0x14 [ 169.321237] kmem_cache_alloc+0x2ae/0x700 [ 169.325394] ? lock_downgrade+0x810/0x810 [ 169.329558] __kernfs_new_node+0xef/0x680 [ 169.330167] kobject: 'queues': free name [ 169.333837] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 169.333855] ? wait_for_completion+0x440/0x440 [ 169.333873] ? kasan_check_write+0x14/0x20 [ 169.351564] ? mutex_unlock+0xd/0x10 [ 169.355294] ? kernfs_activate+0x192/0x1f0 [ 169.359644] kernfs_new_node+0x99/0x130 [ 169.359937] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 169.363622] __kernfs_create_file+0x51/0x33b [ 169.363638] sysfs_add_file_mode_ns+0x222/0x560 [ 169.363655] internal_create_group+0x383/0xc30 [ 169.371597] kobject: 'nr0' (000000003feb6783): kobject_uevent_env [ 169.374820] ? remove_files.isra.0+0x190/0x190 [ 169.374831] ? bd_set_size+0x3f/0xb0 [ 169.374849] sysfs_create_group+0x20/0x30 [ 169.400050] kobject: 'nr0' (000000003feb6783): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 169.403130] lo_ioctl+0xf8f/0x20e0 [ 169.403145] ? lo_rw_aio+0x1470/0x1470 [ 169.403161] blkdev_ioctl+0xc38/0x1ab6 [ 169.423896] ? blkpg_ioctl+0xa90/0xa90 [ 169.427795] ? mark_held_locks+0x100/0x100 [ 169.432046] ? __alloc_pages_slowpath+0x2870/0x2870 [ 169.437154] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 169.442177] ? lock_downgrade+0x810/0x810 [ 169.446461] block_ioctl+0xee/0x130 [ 169.449490] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 169.450082] ? blkdev_fallocate+0x410/0x410 [ 169.450095] do_vfs_ioctl+0xd5f/0x1380 [ 169.450107] ? selinux_file_ioctl+0x46f/0x5e0 [ 169.450122] ? selinux_file_ioctl+0x125/0x5e0 [ 169.476914] ? ioctl_preallocate+0x210/0x210 [ 169.481329] ? selinux_file_mprotect+0x620/0x620 [ 169.486095] ? iterate_fd+0x360/0x360 [ 169.489900] ? do_sys_open+0x31d/0x550 [ 169.493806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 169.499441] ? security_file_ioctl+0x8d/0xc0 [ 169.503858] ksys_ioctl+0xab/0xd0 [ 169.507323] __x64_sys_ioctl+0x73/0xb0 [ 169.511321] do_syscall_64+0xfd/0x620 [ 169.515128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.520320] RIP: 0033:0x4596e7 [ 169.523514] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.542681] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 169.550482] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 169.558626] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 169.565996] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 169.573271] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 169.580634] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 169.613228] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 169.621380] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 169.629974] kobject: 'nr0' (000000003feb6783): kobject_cleanup, parent (null) [ 169.646536] hfs: session requires an argument [ 169.656713] hfs: unable to parse mount options [ 169.658713] kobject: 'nr0' (000000003feb6783): calling ktype release [ 169.668411] kobject: 'nr0': free name [ 169.674060] kobject: 'nr0' (0000000072577eaf): kobject_add_internal: parent: 'net', set: 'devices' [ 169.686489] kobject: 'nr0' (0000000072577eaf): kobject_uevent_env [ 169.694236] kobject: 'nr0' (0000000072577eaf): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 169.703914] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 169.713257] kobject: 'queues' (00000000d7a0425c): kobject_add_internal: parent: 'nr0', set: '' [ 169.723112] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 169.739729] kobject: 'queues' (00000000d7a0425c): kobject_uevent_env 09:36:54 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 169.759009] kobject: 'queues' (00000000d7a0425c): kobject_uevent_env: filter function caused the event to drop! [ 169.794355] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env 09:36:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) [ 169.814134] kobject: 'rx-0' (000000001feb54ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 169.823922] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 169.846025] kobject: 'rx-0' (000000001feb54ab): kobject_uevent_env [ 169.862885] kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env [ 169.871799] FAULT_INJECTION: forcing a failure. [ 169.871799] name failslab, interval 1, probability 0, space 0, times 0 [ 169.888864] kobject: 'rx-0' (000000001feb54ab): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 169.902083] kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 169.912171] CPU: 1 PID: 8496 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 169.919206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.928570] Call Trace: [ 169.931173] dump_stack+0x172/0x1f0 [ 169.934900] should_fail.cold+0xa/0x1b [ 169.938895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 169.944009] ? lock_downgrade+0x810/0x810 [ 169.948256] ? set_page_refcounted+0x100/0x100 [ 169.952850] __should_failslab+0x121/0x190 [ 169.957303] should_failslab+0x9/0x14 [ 169.961202] kmem_cache_alloc+0x2ae/0x700 [ 169.965355] ? lock_downgrade+0x810/0x810 [ 169.969508] __kernfs_new_node+0xef/0x680 [ 169.973667] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 169.978431] ? wait_for_completion+0x440/0x440 [ 169.983022] ? kasan_check_write+0x14/0x20 [ 169.987268] ? mutex_unlock+0xd/0x10 [ 169.990989] ? kernfs_activate+0x192/0x1f0 [ 169.995231] kernfs_new_node+0x99/0x130 [ 169.999215] __kernfs_create_file+0x51/0x33b [ 170.003634] sysfs_add_file_mode_ns+0x222/0x560 [ 170.008310] internal_create_group+0x383/0xc30 [ 170.012987] ? remove_files.isra.0+0x190/0x190 [ 170.017662] ? bd_set_size+0x3f/0xb0 [ 170.021476] sysfs_create_group+0x20/0x30 [ 170.025631] lo_ioctl+0xf8f/0x20e0 [ 170.029175] ? lo_rw_aio+0x1470/0x1470 [ 170.033065] blkdev_ioctl+0xc38/0x1ab6 [ 170.037133] ? blkpg_ioctl+0xa90/0xa90 [ 170.041020] ? mark_held_locks+0x100/0x100 [ 170.045256] ? __alloc_pages_slowpath+0x2870/0x2870 [ 170.050360] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 170.055383] ? lock_downgrade+0x810/0x810 [ 170.059653] block_ioctl+0xee/0x130 [ 170.063285] ? blkdev_fallocate+0x410/0x410 [ 170.067623] do_vfs_ioctl+0xd5f/0x1380 [ 170.071523] ? selinux_file_ioctl+0x46f/0x5e0 [ 170.076016] ? selinux_file_ioctl+0x125/0x5e0 [ 170.080513] ? ioctl_preallocate+0x210/0x210 [ 170.085022] ? selinux_file_mprotect+0x620/0x620 [ 170.089870] ? iterate_fd+0x360/0x360 [ 170.093673] ? do_sys_open+0x31d/0x550 [ 170.097568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 170.103211] ? security_file_ioctl+0x8d/0xc0 [ 170.107622] ksys_ioctl+0xab/0xd0 [ 170.111084] __x64_sys_ioctl+0x73/0xb0 [ 170.114979] do_syscall_64+0xfd/0x620 [ 170.118786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.123982] RIP: 0033:0x4596e7 [ 170.127179] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.146117] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 170.153951] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 09:36:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 170.161307] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 170.168675] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 170.176152] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 170.183434] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 170.204868] kobject: 'tx-0' (0000000081dfa64f): kobject_add_internal: parent: 'queues', set: 'queues' [ 170.233931] kobject: 'tx-0' (0000000081dfa64f): kobject_uevent_env [ 170.241273] kobject: 'tx-0' (0000000081dfa64f): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 170.254739] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 170.261239] kobject: 'rx-0' (000000001feb54ab): kobject_cleanup, parent 00000000d7a0425c [ 170.261249] kobject: 'rx-0' (000000001feb54ab): auto cleanup 'remove' event [ 170.261257] kobject: 'rx-0' (000000001feb54ab): kobject_uevent_env [ 170.261289] kobject: 'rx-0' (000000001feb54ab): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 170.261356] kobject: 'rx-0' (000000001feb54ab): auto cleanup kobject_del [ 170.270638] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 170.323722] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 170.342322] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 170.349721] kobject: 'rx-0' (000000001feb54ab): calling ktype release [ 170.355949] hfs: session requires an argument [ 170.358511] kobject: 'rx-0': free name [ 170.358564] kobject: 'tx-0' (0000000081dfa64f): kobject_cleanup, parent 00000000d7a0425c [ 170.377738] hfs: unable to parse mount options [ 170.389748] kobject: 'tx-0' (0000000081dfa64f): auto cleanup 'remove' event [ 170.399294] kobject: 'tx-0' (0000000081dfa64f): kobject_uevent_env [ 170.414913] kobject: 'tx-0' (0000000081dfa64f): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 170.428200] kobject: 'tx-0' (0000000081dfa64f): auto cleanup kobject_del [ 170.435491] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 170.444923] kobject: 'tx-0' (0000000081dfa64f): calling ktype release [ 170.452021] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 170.464245] kobject: 'tx-0': free name [ 170.477807] kobject: 'queues' (00000000d7a0425c): kobject_cleanup, parent (null) [ 170.516026] kobject: 'queues' (00000000d7a0425c): calling ktype release [ 170.526274] kobject: 'queues' (00000000d7a0425c): kset_release [ 170.537124] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 170.546248] kobject: 'queues': free name [ 170.551022] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 170.563973] kobject: 'nr0' (0000000072577eaf): kobject_uevent_env [ 170.574694] kobject: 'nr0' (0000000072577eaf): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 170.629988] kobject: 'nr0' (0000000072577eaf): kobject_cleanup, parent (null) [ 170.638624] kobject: 'nr0' (0000000072577eaf): calling ktype release [ 170.647880] kobject: 'nr0': free name 09:36:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x4b49, &(0x7f0000000100)) 09:36:55 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:55 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) [ 170.670294] kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env [ 170.676747] kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 170.708342] FAULT_INJECTION: forcing a failure. [ 170.708342] name failslab, interval 1, probability 0, space 0, times 0 [ 170.731404] CPU: 1 PID: 8516 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 170.738363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.747808] Call Trace: [ 170.750410] dump_stack+0x172/0x1f0 [ 170.754040] should_fail.cold+0xa/0x1b [ 170.757946] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 170.763411] ? lock_downgrade+0x810/0x810 [ 170.767583] ? set_page_refcounted+0x100/0x100 [ 170.772173] __should_failslab+0x121/0x190 [ 170.776416] should_failslab+0x9/0x14 [ 170.780218] kmem_cache_alloc+0x2ae/0x700 [ 170.784372] ? lock_downgrade+0x810/0x810 [ 170.788624] __kernfs_new_node+0xef/0x680 [ 170.792776] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 170.797537] ? wait_for_completion+0x440/0x440 [ 170.802119] ? kasan_check_write+0x14/0x20 [ 170.806359] ? mutex_unlock+0xd/0x10 [ 170.810070] ? kernfs_activate+0x192/0x1f0 [ 170.814402] kernfs_new_node+0x99/0x130 [ 170.818729] __kernfs_create_file+0x51/0x33b [ 170.823144] sysfs_add_file_mode_ns+0x222/0x560 [ 170.828016] internal_create_group+0x383/0xc30 [ 170.832617] ? remove_files.isra.0+0x190/0x190 [ 170.837201] ? bd_set_size+0x3f/0xb0 [ 170.840931] sysfs_create_group+0x20/0x30 [ 170.845089] lo_ioctl+0xf8f/0x20e0 [ 170.848646] ? lo_rw_aio+0x1470/0x1470 [ 170.852555] blkdev_ioctl+0xc38/0x1ab6 [ 170.856458] ? blkpg_ioctl+0xa90/0xa90 [ 170.860352] ? mark_held_locks+0x100/0x100 [ 170.864598] ? __alloc_pages_slowpath+0x2870/0x2870 [ 170.869625] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 170.874656] ? lock_downgrade+0x810/0x810 [ 170.878924] block_ioctl+0xee/0x130 [ 170.882546] ? blkdev_fallocate+0x410/0x410 [ 170.886921] do_vfs_ioctl+0xd5f/0x1380 [ 170.890823] ? selinux_file_ioctl+0x46f/0x5e0 [ 170.895316] ? selinux_file_ioctl+0x125/0x5e0 [ 170.899806] ? ioctl_preallocate+0x210/0x210 [ 170.906474] ? selinux_file_mprotect+0x620/0x620 [ 170.911470] ? iterate_fd+0x360/0x360 [ 170.915356] ? do_sys_open+0x31d/0x550 [ 170.919275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 170.924822] ? security_file_ioctl+0x8d/0xc0 [ 170.929233] ksys_ioctl+0xab/0xd0 [ 170.933129] __x64_sys_ioctl+0x73/0xb0 [ 170.937031] do_syscall_64+0xfd/0x620 [ 170.941227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.946414] RIP: 0033:0x4596e7 [ 170.949607] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.968527] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:36:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:55 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) [ 170.976347] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 170.983629] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 170.990908] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 170.998218] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 171.005494] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 171.016863] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 171.023892] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 171.037105] hfs: session requires an argument [ 171.041792] hfs: unable to parse mount options [ 171.045515] kobject: 'loop5' (000000002bd82985): kobject_uevent_env [ 171.054690] kobject: 'nr0' (00000000a2dc32a4): kobject_add_internal: parent: 'net', set: 'devices' [ 171.055878] kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 171.064854] kobject: 'nr0' (00000000a2dc32a4): kobject_uevent_env [ 171.080200] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 171.086639] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 171.091163] kobject: 'nr0' (00000000a2dc32a4): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 171.105952] kobject: 'queues' (00000000744a9663): kobject_add_internal: parent: 'nr0', set: '' [ 171.115881] kobject: 'loop0' (000000002acb91e0): kobject_uevent_env 09:36:55 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 171.140010] kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 171.149879] kobject: 'queues' (00000000744a9663): kobject_uevent_env [ 171.151336] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 171.161609] kobject: 'queues' (00000000744a9663): kobject_uevent_env: filter function caused the event to drop! [ 171.163537] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 171.219466] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 171.229772] kobject: 'rx-0' (00000000b9c870f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 171.243319] FAULT_INJECTION: forcing a failure. [ 171.243319] name failslab, interval 1, probability 0, space 0, times 0 [ 171.263396] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 171.273501] kobject: 'rx-0' (00000000b9c870f8): kobject_uevent_env [ 171.290578] CPU: 1 PID: 8537 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 171.297623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.306982] Call Trace: [ 171.309587] dump_stack+0x172/0x1f0 [ 171.313225] should_fail.cold+0xa/0x1b [ 171.317131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 171.322243] ? lock_downgrade+0x810/0x810 [ 171.326405] ? set_page_refcounted+0x100/0x100 [ 171.331003] __should_failslab+0x121/0x190 [ 171.335362] should_failslab+0x9/0x14 [ 171.339252] kmem_cache_alloc+0x2ae/0x700 [ 171.343404] ? lock_downgrade+0x810/0x810 [ 171.347557] __kernfs_new_node+0xef/0x680 [ 171.351715] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 171.356477] ? wait_for_completion+0x440/0x440 [ 171.361065] ? kasan_check_write+0x14/0x20 [ 171.365313] ? mutex_unlock+0xd/0x10 [ 171.369033] ? kernfs_activate+0x192/0x1f0 [ 171.373280] kernfs_new_node+0x99/0x130 [ 171.377261] __kernfs_create_file+0x51/0x33b [ 171.381679] sysfs_add_file_mode_ns+0x222/0x560 [ 171.386370] internal_create_group+0x383/0xc30 [ 171.391141] ? remove_files.isra.0+0x190/0x190 [ 171.395813] ? bd_set_size+0x3f/0xb0 [ 171.399641] sysfs_create_group+0x20/0x30 [ 171.403791] lo_ioctl+0xf8f/0x20e0 [ 171.407334] ? lo_rw_aio+0x1470/0x1470 [ 171.411314] blkdev_ioctl+0xc38/0x1ab6 [ 171.415279] ? blkpg_ioctl+0xa90/0xa90 [ 171.419179] ? mark_held_locks+0x100/0x100 [ 171.423456] ? __alloc_pages_slowpath+0x2870/0x2870 [ 171.428569] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 171.433592] ? lock_downgrade+0x810/0x810 [ 171.437755] block_ioctl+0xee/0x130 [ 171.441386] ? blkdev_fallocate+0x410/0x410 [ 171.445710] do_vfs_ioctl+0xd5f/0x1380 [ 171.449687] ? selinux_file_ioctl+0x46f/0x5e0 [ 171.454184] ? selinux_file_ioctl+0x125/0x5e0 [ 171.458703] ? ioctl_preallocate+0x210/0x210 [ 171.463121] ? selinux_file_mprotect+0x620/0x620 [ 171.467890] ? iterate_fd+0x360/0x360 [ 171.471699] ? do_sys_open+0x31d/0x550 [ 171.475595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 171.481141] ? security_file_ioctl+0x8d/0xc0 [ 171.485553] ksys_ioctl+0xab/0xd0 [ 171.489010] __x64_sys_ioctl+0x73/0xb0 [ 171.492904] do_syscall_64+0xfd/0x620 [ 171.496804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.501997] RIP: 0033:0x4596e7 [ 171.505191] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.524274] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 171.531990] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 171.539322] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 171.546592] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 171.553905] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 171.561173] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:56 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) [ 171.584156] kobject: 'rx-0' (00000000b9c870f8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 171.613745] kobject: 'tx-0' (00000000553e6e68): kobject_add_internal: parent: 'queues', set: 'queues' [ 171.623755] kobject: 'tx-0' (00000000553e6e68): kobject_uevent_env [ 171.632727] kobject: 'tx-0' (00000000553e6e68): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 171.644355] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 171.657084] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 171.667039] kobject: 'rx-0' (00000000b9c870f8): kobject_cleanup, parent 00000000744a9663 [ 171.677448] kobject: 'rx-0' (00000000b9c870f8): auto cleanup 'remove' event [ 171.704238] kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env [ 171.724193] hfs: session requires an argument [ 171.728841] kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 171.746052] kobject: 'rx-0' (00000000b9c870f8): kobject_uevent_env [ 171.762925] hfs: unable to parse mount options [ 171.770628] kobject: 'rx-0' (00000000b9c870f8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 171.795314] kobject: 'rx-0' (00000000b9c870f8): auto cleanup kobject_del [ 171.807537] kobject: 'rx-0' (00000000b9c870f8): calling ktype release [ 171.814648] kobject: 'rx-0': free name [ 171.818739] kobject: 'tx-0' (00000000553e6e68): kobject_cleanup, parent 00000000744a9663 [ 171.827316] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 171.836784] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 171.846873] kobject: 'tx-0' (00000000553e6e68): auto cleanup 'remove' event 09:36:56 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 171.876721] kobject: 'tx-0' (00000000553e6e68): kobject_uevent_env [ 171.901316] kobject: 'tx-0' (00000000553e6e68): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 171.912447] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 171.918909] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 171.936386] kobject: 'tx-0' (00000000553e6e68): auto cleanup kobject_del [ 171.955456] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 171.962752] kobject: 'tx-0' (00000000553e6e68): calling ktype release [ 171.969528] FAULT_INJECTION: forcing a failure. [ 171.969528] name failslab, interval 1, probability 0, space 0, times 0 [ 171.983507] kobject: 'tx-0': free name [ 171.987579] kobject: 'queues' (00000000744a9663): kobject_cleanup, parent (null) [ 171.996706] CPU: 1 PID: 8557 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 172.003644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.013109] Call Trace: [ 172.015711] dump_stack+0x172/0x1f0 [ 172.019467] should_fail.cold+0xa/0x1b [ 172.023450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 172.028657] ? lock_downgrade+0x810/0x810 [ 172.033160] ? set_page_refcounted+0x100/0x100 [ 172.037757] __should_failslab+0x121/0x190 [ 172.042003] should_failslab+0x9/0x14 [ 172.045899] kmem_cache_alloc_trace+0x2cc/0x760 [ 172.050580] kobject_uevent_env+0x387/0x101d [ 172.054994] kobject_uevent+0x20/0x26 [ 172.058802] lo_ioctl+0x100b/0x20e0 [ 172.062472] ? lo_rw_aio+0x1470/0x1470 [ 172.066427] blkdev_ioctl+0xc38/0x1ab6 [ 172.070345] ? blkpg_ioctl+0xa90/0xa90 [ 172.074256] ? mark_held_locks+0x100/0x100 [ 172.078490] ? __alloc_pages_slowpath+0x2870/0x2870 [ 172.083597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 172.088620] ? lock_downgrade+0x810/0x810 [ 172.092783] block_ioctl+0xee/0x130 [ 172.096409] ? blkdev_fallocate+0x410/0x410 [ 172.100732] do_vfs_ioctl+0xd5f/0x1380 [ 172.104625] ? selinux_file_ioctl+0x46f/0x5e0 [ 172.109300] ? selinux_file_ioctl+0x125/0x5e0 [ 172.113888] ? ioctl_preallocate+0x210/0x210 [ 172.118474] ? selinux_file_mprotect+0x620/0x620 [ 172.123251] ? iterate_fd+0x360/0x360 [ 172.127059] ? do_sys_open+0x31d/0x550 [ 172.130955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.136495] ? security_file_ioctl+0x8d/0xc0 [ 172.140996] ksys_ioctl+0xab/0xd0 [ 172.144449] __x64_sys_ioctl+0x73/0xb0 [ 172.148339] do_syscall_64+0xfd/0x620 [ 172.152144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.157335] RIP: 0033:0x4596e7 [ 172.160528] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.179527] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 172.190107] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 172.197380] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 172.204743] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 172.212018] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 172.219289] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 09:36:56 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 172.239306] kobject: 'queues' (00000000744a9663): calling ktype release [ 172.255614] kobject: 'queues' (00000000744a9663): kset_release [ 172.264823] kobject: 'queues': free name [ 172.269491] kobject: 'nr0' (00000000a2dc32a4): kobject_uevent_env [ 172.278405] kobject: 'nr0' (00000000a2dc32a4): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 172.297544] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 172.313282] hfs: session requires an argument [ 172.317966] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 172.335098] hfs: unable to parse mount options [ 172.340327] kobject: 'nr0' (00000000a2dc32a4): kobject_cleanup, parent (null) [ 172.357368] kobject: 'nr0' (00000000a2dc32a4): calling ktype release [ 172.368970] kobject: 'nr0': free name [ 172.376075] kobject: 'nr0' (0000000014898743): kobject_add_internal: parent: 'net', set: 'devices' [ 172.386785] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 172.395540] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 172.406253] kobject: 'nr0' (0000000014898743): kobject_uevent_env [ 172.427856] kobject: 'nr0' (0000000014898743): fill_kobj_path: path = '/devices/virtual/net/nr0' 09:36:57 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) [ 172.466714] kobject: 'queues' (000000008fef055f): kobject_add_internal: parent: 'nr0', set: '' [ 172.476969] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 172.486855] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 172.496821] kobject: 'queues' (000000008fef055f): kobject_uevent_env [ 172.515922] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 172.528390] kobject: 'queues' (000000008fef055f): kobject_uevent_env: filter function caused the event to drop! [ 172.539175] FAULT_INJECTION: forcing a failure. [ 172.539175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.551293] CPU: 1 PID: 8566 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 172.558311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.567666] Call Trace: [ 172.570271] dump_stack+0x172/0x1f0 [ 172.573918] should_fail.cold+0xa/0x1b [ 172.577999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 172.583114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.584860] kobject: 'rx-0' (000000006de53f40): kobject_add_internal: parent: 'queues', set: 'queues' [ 172.588678] ? mark_held_locks+0x100/0x100 [ 172.588693] __alloc_pages_nodemask+0x1ee/0x750 [ 172.588711] ? __irq_work_queue_local+0xaf/0x170 [ 172.598339] kobject: 'rx-0' (000000006de53f40): kobject_uevent_env [ 172.602388] ? __alloc_pages_slowpath+0x2870/0x2870 [ 172.602403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.602416] ? wake_up_klogd+0x99/0xd0 [ 172.602431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 172.602448] cache_grow_begin+0x91/0x8c0 [ 172.607180] kobject: 'rx-0' (000000006de53f40): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 172.611864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 172.611878] ? check_preemption_disabled+0x48/0x290 [ 172.611893] kmem_cache_alloc_trace+0x685/0x760 [ 172.611912] kobject_uevent_env+0x387/0x101d [ 172.618317] kobject: 'tx-0' (00000000625a54a5): kobject_add_internal: parent: 'queues', set: 'queues' [ 172.623208] kobject_uevent+0x20/0x26 [ 172.623221] lo_ioctl+0x100b/0x20e0 [ 172.623235] ? lo_rw_aio+0x1470/0x1470 [ 172.623256] blkdev_ioctl+0xc38/0x1ab6 [ 172.686489] kobject: 'tx-0' (00000000625a54a5): kobject_uevent_env [ 172.688834] ? blkpg_ioctl+0xa90/0xa90 [ 172.688851] ? mark_held_locks+0x100/0x100 [ 172.692820] kobject: 'tx-0' (00000000625a54a5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 172.696595] ? __alloc_pages_slowpath+0x2870/0x2870 [ 172.696610] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 172.696625] ? lock_downgrade+0x810/0x810 [ 172.735507] block_ioctl+0xee/0x130 [ 172.739139] ? blkdev_fallocate+0x410/0x410 [ 172.743477] do_vfs_ioctl+0xd5f/0x1380 [ 172.747401] ? selinux_file_ioctl+0x46f/0x5e0 [ 172.751990] ? selinux_file_ioctl+0x125/0x5e0 [ 172.756488] ? ioctl_preallocate+0x210/0x210 [ 172.760897] ? selinux_file_mprotect+0x620/0x620 [ 172.765657] ? iterate_fd+0x360/0x360 [ 172.769458] ? do_sys_open+0x31d/0x550 [ 172.773358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.778905] ? security_file_ioctl+0x8d/0xc0 [ 172.783318] ksys_ioctl+0xab/0xd0 [ 172.786779] __x64_sys_ioctl+0x73/0xb0 [ 172.790673] do_syscall_64+0xfd/0x620 [ 172.794593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.799785] RIP: 0033:0x4596e7 09:36:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) [ 172.803081] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.822100] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 172.829826] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 172.837329] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 172.844589] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 172.851983] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 172.859275] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 172.875581] kobject: 'rx-0' (000000006de53f40): kobject_cleanup, parent 000000008fef055f [ 172.881777] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 172.892700] kobject: 'rx-0' (000000006de53f40): auto cleanup 'remove' event [ 172.908246] kobject: 'loop0' (000000002acb91e0): kobject_uevent_env [ 172.923990] kobject: 'rx-0' (000000006de53f40): kobject_uevent_env [ 172.924198] hfs: session requires an argument [ 172.935456] kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 172.937164] kobject: 'rx-0' (000000006de53f40): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 172.947093] hfs: unable to parse mount options [ 172.960638] kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env [ 172.967267] kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 172.991842] kobject: 'rx-0' (000000006de53f40): auto cleanup kobject_del [ 173.009064] kobject: 'rx-0' (000000006de53f40): calling ktype release [ 173.009770] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 173.023442] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 173.033484] kobject: 'rx-0': free name [ 173.048030] kobject: 'loop4' (000000007085cc49): kobject_uevent_env [ 173.048965] kobject: 'tx-0' (00000000625a54a5): kobject_cleanup, parent 000000008fef055f [ 173.058398] kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 173.093861] kobject: 'tx-0' (00000000625a54a5): auto cleanup 'remove' event [ 173.103252] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 173.117613] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 173.127550] kobject: 'tx-0' (00000000625a54a5): kobject_uevent_env [ 173.140256] kobject: 'tx-0' (00000000625a54a5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 173.161182] kobject: 'tx-0' (00000000625a54a5): auto cleanup kobject_del [ 173.171995] kobject: 'loop1' (000000000f5cea77): kobject_uevent_env [ 173.180704] kobject: 'tx-0' (00000000625a54a5): calling ktype release [ 173.190997] kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 173.206160] kobject: 'tx-0': free name [ 173.215657] kobject: 'queues' (000000008fef055f): kobject_cleanup, parent (null) [ 173.232514] kobject: 'queues' (000000008fef055f): calling ktype release [ 173.239339] kobject: 'queues' (000000008fef055f): kset_release [ 173.246616] kobject: 'queues': free name [ 173.252224] kobject: 'nr0' (0000000014898743): kobject_uevent_env [ 173.258640] kobject: 'nr0' (0000000014898743): fill_kobj_path: path = '/devices/virtual/net/nr0' 09:36:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCGIFHWADDR(r0, 0x541b, &(0x7f0000000100)) 09:36:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x104) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) 09:36:57 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)={0x0, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) exit(0x66e) 09:36:57 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@session={'session', 0x3d, 0xffffffff}}]}) 09:36:57 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\xcb\b\x8c\x1b\xdbo\x82\x87\xac\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\f\x00\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 173.300869] kobject: 'nr0' (0000000014898743): kobject_cleanup, parent (null) [ 173.309292] kobject: 'nr0' (0000000014898743): calling ktype release [ 173.317238] kobject: 'nr0': free name [ 173.367068] FAULT_INJECTION: forcing a failure. [ 173.367068] name failslab, interval 1, probability 0, space 0, times 0 [ 173.382848] CPU: 1 PID: 8585 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 173.390323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.399688] Call Trace: [ 173.402333] dump_stack+0x172/0x1f0 [ 173.405992] should_fail.cold+0xa/0x1b [ 173.409894] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 173.415014] ? lock_downgrade+0x810/0x810 [ 173.419174] ? set_page_refcounted+0x100/0x100 [ 173.423778] __should_failslab+0x121/0x190 [ 173.428018] should_failslab+0x9/0x14 [ 173.431821] kmem_cache_alloc+0x2ae/0x700 [ 173.435977] ? lock_downgrade+0x810/0x810 [ 173.440135] __kernfs_new_node+0xef/0x680 [ 173.444299] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 173.449060] ? wait_for_completion+0x440/0x440 [ 173.453651] ? kasan_check_write+0x14/0x20 [ 173.457989] ? mutex_unlock+0xd/0x10 [ 173.461717] ? kernfs_activate+0x192/0x1f0 [ 173.465959] kernfs_new_node+0x99/0x130 [ 173.469938] __kernfs_create_file+0x51/0x33b [ 173.474354] sysfs_add_file_mode_ns+0x222/0x560 [ 173.479073] internal_create_group+0x383/0xc30 [ 173.483669] ? remove_files.isra.0+0x190/0x190 [ 173.488263] ? bd_set_size+0x3f/0xb0 [ 173.491986] sysfs_create_group+0x20/0x30 [ 173.496135] lo_ioctl+0xf8f/0x20e0 [ 173.499684] ? lo_rw_aio+0x1470/0x1470 [ 173.503578] blkdev_ioctl+0xc38/0x1ab6 [ 173.507469] ? blkpg_ioctl+0xa90/0xa90 [ 173.511357] ? mark_held_locks+0x100/0x100 [ 173.515596] ? __alloc_pages_slowpath+0x2870/0x2870 [ 173.520621] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 173.525645] ? lock_downgrade+0x810/0x810 [ 173.529803] block_ioctl+0xee/0x130 [ 173.533429] ? blkdev_fallocate+0x410/0x410 [ 173.537753] do_vfs_ioctl+0xd5f/0x1380 [ 173.541646] ? selinux_file_ioctl+0x46f/0x5e0 [ 173.546328] ? selinux_file_ioctl+0x125/0x5e0 [ 173.553265] ? ioctl_preallocate+0x210/0x210 [ 173.558760] ? selinux_file_mprotect+0x620/0x620 [ 173.564369] ? iterate_fd+0x360/0x360 [ 173.568436] ? do_sys_open+0x31d/0x550 [ 173.572951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.579306] ? security_file_ioctl+0x8d/0xc0 [ 173.583721] ksys_ioctl+0xab/0xd0 [ 173.587173] __x64_sys_ioctl+0x73/0xb0 [ 173.591061] do_syscall_64+0xfd/0x620 [ 173.594865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.600149] RIP: 0033:0x4596e7 [ 173.603379] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.623078] RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.630810] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 [ 173.638090] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 173.645359] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 173.652718] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 173.660074] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 [ 173.678281] kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env [ 173.685232] kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 173.704203] kobject: 'loop5' (000000002bd82985): kobject_uevent_env