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"}, 0x1008) [ 295.928658] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x600000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 295.971646] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 295.981073] audit: type=1804 audit(1539712099.055:80): pid=9684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/92/file0" dev="sda1" ino=16666 res=1 17:48:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000240)=""/237) read(r0, &(0x7f0000000000)=""/91, 0xfffffffffffffeea) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000340)={0x2, [0xffff, 0x2]}, &(0x7f0000000380)=0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000640)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x3}}, 0x18) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f0000000140)) 17:48:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 296.046758] audit: type=1804 audit(1539712099.085:81): pid=9690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/92/file0" dev="sda1" ino=16666 res=1 17:48:19 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="54e1988b525ad957ab8028b90de4b8d0baff8453751efbe3cd4762519c536fc9b1d4d8eeab48cafbfb09d550b96e6ce44aab6d6c465d17ce2ccc4709ba99e95d990a232d9348621f9e6411ee7cb8ddc3e244a7b02105602e65d33bef3a175d8cc912340943d3559d73df4c95401f520ba7d760f25b6321260d03908c93a4587f807f8fcfd28e1e9379c41ea5d7c3e8903b02ffa9e0518bd52fd4c93b2be9c0ab80184bc03c38cb7fde9326dd9b1baa57a3898169bf549579c90dd90ac85f8dd125343bdf6d9d05a9a1b4ee1ca98ba87e6303cecc", 0xd4, 0xfffffffffffffffb) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffff001, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000240)={r3, 0x3}) keyctl$set_timeout(0xf, r1, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000000280)=""/91, 0x301) 17:48:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0010000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 296.164016] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.235614] audit: type=1804 audit(1539712099.305:82): pid=9708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/93/file0" dev="sda1" ino=16593 res=1 [ 296.266516] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 296.273775] audit: type=1804 audit(1539712099.335:83): pid=9717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/93/file0" dev="sda1" ino=16593 res=1 [ 296.350210] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:20 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x4, 0x400000) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/148) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000340)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000004c0)=0x1) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x78) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:48:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001c80)={"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"}) open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r0) ioctl$RTC_AIE_ON(r0, 0x7001) 17:48:20 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(r0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 297.034051] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:20 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000140)=""/4096) read(r0, &(0x7f0000367fe4)=""/91, 0x275) [ 297.171596] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB="000028abaaaaaaaaaabbaaaaaab8aabb0180c2000000000004000000014f3a000068000000aaaabb000000000000ffffffffffff0180c20000007c3a50654e4ddf504370801dc831af8f03841138c4"]) 17:48:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001c80)={"9b2e8292a86c26ef6cfceafc38cbd6b30fb01c31708c4af7417eeb244579f579996a2982273e6229b96c1028ed2a933aade600fd3dd3e9d776343a0a6a8c90058b4a0762887941a9eb6c2816f46b1c63260c592d10867ca13013ee846199085247d718750c0ff774f5402eeaae448a8d5219c12c1048b9419abb4c5202fb80f9a60cf3a6a2ba50754b997bc1480aecbd590e2047b81e0def56faadd3fb2b1b7c913538aa74689a1b5841483db5c8bae92448d0bd00d1966b3dd6a7bd5890abb172676cdd40443153e375881ecf2fb90e7c86e4701165ca5816e7af953b5b8fd6e4a4b2a25cfee405897e20b472bc16da2c716db62c69eed04cbef2c167da60e1794bed98758ba0416fc93ac702beea0fd3266ec75489f80e982e9d7aef0bf111fcafed0f83d182cbcbd9e157a3b32f48868c9dbba9e055e59caaaf61fbfb189f2353142b18d2af35547731e7f4b1d4f28a1a78a0e7a43aef0a2072f1f8a11af6c043a6483cf1fc13e79a36c2704e0496a5a216178c01ad03e18363a982d9a44833758fdf8899ac4e83cfaf6354804e6788c7083db2c0f3aaa11a16b323e8c179924ea81d470c2234894401174b61ee1b9320edc7d8d09358a98d9a13f8f778cbb8ba3efc436206b7931d4ac51354426913f6b0e9dd94c4c13f9d875d84418386b1d1a398441711dac9835ba958fe7b77b8b37a38025f43e52876f982c09af7b8eee13d43fa352337a81db86da18f049cc31e9980a99da77585d801add560cbc720b43168a235b272b9d08b3a6ab0b0b7a71e9cde055e65dee6b5f7e1a00c5f73f8d43f7132ea212c7924b960080cb9c633518745c07245ad2ea5041386e7706f200cac200d0d94a6ecf51dabbcce542aa6dc7517d586e83e92d3bf7b3b65c89d01cf243d55ee2b666ff2ab50d31514522e3472ccb371702383bdda19f0e586dab1902990b7f36ade17c9300b1e404ce785ec7bb9a4c3ad534778c962b153b335f3ac95fad6d0458899d87848578285cbe479e64f45fca4a072e0704cc0934de975079c52a42d0a105bbb5ecf6771fedd95d2195bb7510668d4775656d4747a0cacf15defa19c7b9c2671b3ae4b7a841b01bf9f3d1491a1600e50db11fe4c4077032ffcdac5dbf08aeb0df6d0dc8f6e474d052443ce6c8dc8596965c696fa86955b59c0f8dcea64ef5d076a699eb6e68be4658b6cdb21bb6dea6be5213a69ed331221eafcd060b3b477696c07d171f644958ed401aa051b2dd5896f0cb7aee051da94ebf8e85852b418732b632f6aae4e2a9f8bcd1daad4c8111f53a74bebb438a5435f8a9f63a6c59ab4a5cecbc5d710f429301135f1e374ff8aba28ac39360c2b2c35b8aaa1d795ee7e3a39b1b5ea59d809c321fb84d3260cfd81fa22fccbb84073596fe8f24b276f2144c4cd0ffbd6b07e444e1298d8ab2a726e81b729ea91"}) open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r0) ioctl$RTC_AIE_ON(r0, 0x7001) 17:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xad000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:20 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x9, 0x7fffffff, 0x9, 0x0, 0xffffffff00000001}) read(r1, &(0x7f0000000140)=""/91, 0x5b) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) 17:48:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:20 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000280)=0x2, 0x4, 0x0, &(0x7f0000000080)={r3, r4+30000000}, &(0x7f0000000240)=0x2, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000180)="d9", 0x1, 0xfffffffffffffffd) keyctl$describe(0x10, r6, &(0x7f00000002c0)=""/177, 0xb1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r7) syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file0\x00', 0x1, 0xa, &(0x7f0000001940)=[{&(0x7f0000000400)="6225bb3d8a0cbfead5ac497202a4c75af5bc10583993caa2b275d8840574291b75436adcb50129ee06cf5bf9ab9b089de9b4b89888118f98027ea5d6a363dbdd8c54867cb322d8fd13fe15aae320cc8d7868879af3f148841c1a0b628895166121af011a3cc7a3ebcb1ce909", 0x6c}, {&(0x7f0000000480)="8df324a01cf2318b402e8cae81c4d1e599be9384d03a85f2151e1d5b1b81953780f3fea39b1b5f84b0c29896de1ea329de53913e349b3f625ef5cf561f3d281ab113a6ea47b522e7bf22667e74950af08b30193e99dc711cb98b07b062c259da321b0e798add735a5718011a1fca6b416242ba8ed296363cb312c265309b1c43c96648fcf8f1834378170b7d7fef9f7017f3d663c907e87ec8a4653d4bafe3b93c783337cf50199a9955b787344ae6752a12952fc97de0eae10307196ff224d23e5271fad018ab13d82ce3ae4b9089305dc57a4948b5baa0a0fc4ec3f1efe8f3d2fc893db0b10003d1313ef2", 0xec, 0xfff}, {&(0x7f0000000580)="17c5f1baadc0c1da376efbc8add4e1b3d80858e2c91675f0fb695f24610cf63bd01bf50b40b9fff62ba3d68d0f49c9e31d19322d82dfce951c177a9a77000775971dd28d52f11a214b13b8f717f5b529b168c07acdde452c63ea", 0x5a, 0x8}, {&(0x7f0000000600)="c967b2c224120499f291b79122c09daf56738fbc03fec53084f7445cec1cff05c5d6651cd0ec81693c21cdf7d6a2df174aa0638bcefdbf7e7ab83fc7e76c6b018f2a15ca7570f0691038bac39929a2514bdbb536d9551644123397ea9b0ed700cdbf87e8b3ab90d1b56d873e8a4a84ea640b62a2673af9022d3122a0fb6488c21a0810bd8e79bf30bfcee72d5d3342f13d6bbe0c5f737e", 0x97, 0x1000}, {&(0x7f00000006c0)="b3a5cb2b26fa02bc6f69d32187076ade1c3a1ad522032cb6ec7024b6b3a33cad83a360", 0x23, 0x7}, {&(0x7f0000000700)="efbd638a9b11737fd0e8cc0d8573dec6af8a2248de8e013affbafb4755300f08c31f931b13d71fb2e9ef73a01b3b87da5be2e2129f33d30b067bcd01be015077bdd91c1db6842209953e70a5d7d57e8c4f4a16f2fa22a26c92ac181e805a6705ea42ff87375f8a7699feb3ae0a25931b745f350b3e1f79a89633", 0x7a}, {&(0x7f0000000780)="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", 0x1000, 0x9}, {&(0x7f0000001780)="0c30d8c2ceb37814d15e8aee2e507e039ca527dea747f27cdcfb1b97acbbb4c6e93140d315f9fd5954e61ac3c1cdb922d8ddf1b1f7dba72c2906859b946a08322838bddb7077555c520879151e84aedb752469f1bd5142a6b928aa8110c186b8a5e737f07328d44eb3d238691be18861cd7e03c5e97b153581c9f9202f488b8ec64d72c36e499f8a1b355abf895657dbf71fed783fd9cbedbd6862c97595c3d6e485ae28eba47c", 0xa7, 0x4}, {&(0x7f0000001840)="c0739c22fed65c66719ae973d5141b5420b7626da31b0d489a3d982418f00558428a8bf53683953945705978c1c3e1a090a45d8a0823dce148cff49ebab499f8310fca15667a363532795fddb58b002e0e5064d6a586a970461469463381b767106aa508b5dec70d36ba384e921fa4d4787f5cc9e0", 0x75, 0x5}, {&(0x7f00000018c0)="e36dd7a37568d37628deb65b7858bf2cf329bd80fa406149b6008e8ac4f21e43fc9a1f5dc5fc78426aebe4a564c6f324ca35aff1bf76251e063a0898b1e0542b68b181db", 0x44, 0x7fff}], 0x2, &(0x7f0000001a40)={[{@quota_quantum={'quota_quantum'}}, {@localcaching='localcaching'}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x39, 0x33, 0x0, 0x0, 0x30, 0x7c, 0x3f], 0x2d, [0x7f, 0x39, 0x37, 0x75], 0x2d, [0x37, 0x35, 0x66, 0x76], 0x2d, [0x64, 0x75, 0x65, 0x35], 0x2d, [0x7d, 0x61, 0x77, 0x65, 0x38, 0x39, 0x76, 0x37]}}}, {@dont_hash='dont_hash'}, {@uid_eq={'uid', 0x3d, r7}}, {@euid_gt={'euid>', r7}}, {@appraise='appraise'}, {@fowner_eq={'fowner', 0x3d, r7}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x7b, 0x38, 0x77, 0x30, 0x62, 0x0, 0x75], 0x2d, [0x0, 0x36, 0x32, 0x65], 0x2d, [0x64, 0x34, 0x34, 0x32], 0x2d, [0x32, 0x7f, 0x75, 0x36], 0x2d, [0x38, 0x39, 0x0, 0x77, 0x64, 0x33, 0x36, 0x61]}}}, {@subj_type={'subj_type', 0x3d, 'user\x00'}}]}) [ 297.494793] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:20 executing program 3: creat(&(0x7f0000000200)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) gettid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x8100) rt_sigaction(0x30, &(0x7f0000000340)={&(0x7f00000001c0)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {0xfe8}, 0x10000000, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) sysinfo(&(0x7f0000000880)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0x40046205, &(0x7f0000000000)={0x12e, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, &(0x7f0000000100)}) 17:48:20 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xad, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001c80)={"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"}) open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r0) [ 297.666392] gfs2: quota_quantum mount option requires a positive numeric argument 17:48:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 297.722052] gfs2: can't parse mount arguments 17:48:20 executing program 3: creat(&(0x7f0000000200)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) gettid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x8100) rt_sigaction(0x30, &(0x7f0000000340)={&(0x7f00000001c0)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {0xfe8}, 0x10000000, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) sysinfo(&(0x7f0000000880)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0x40046205, &(0x7f0000000000)={0x12e, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="03630c001000007412996258746f0566866fd821267840aae1592b52949dfbdef85cb535acc6f8dc7d3ef7a7188dacd444ea6ed493272ac267871c6f4b7e8081c3a8e13f10fcf7495e1ac1b21ce95d7ed3fab0f50e07a450ce48fdd0053e1c0ca57bda3b9f069c46684a13300bcb300fa11e6d0e157e95b49bea311baa92cad634f27d92da89195a5cdfcc70009fd54bd5c01b0be56ff9d8ea400a4726b39594e675ec8011db57823ebf25af6cb8b9b9d58cb80b2d52cb98571ea409fcdc1d9fcc7bbd405de3604c584358d8b7eb8ef80b86063a6e3a39d6cc55de5bef0113521cb4d6484e5531de3cca23de44c6ba0bd76a4be4e163d71cec164e1fa74d00ea6298ce90528fb84fa8db8364d09ea4897bb04cbe3ed98719b4bdd376554ef1222db0d7105e44faa2725d6f1ebc81"], 0x0, 0x0, &(0x7f0000000100)}) 17:48:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000367fe4)=""/91, 0x275) 17:48:20 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="a0"], 0x1) 17:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001c80)={"9b2e8292a86c26ef6cfceafc38cbd6b30fb01c31708c4af7417eeb244579f579996a2982273e6229b96c1028ed2a933aade600fd3dd3e9d776343a0a6a8c90058b4a0762887941a9eb6c2816f46b1c63260c592d10867ca13013ee846199085247d718750c0ff774f5402eeaae448a8d5219c12c1048b9419abb4c5202fb80f9a60cf3a6a2ba50754b997bc1480aecbd590e2047b81e0def56faadd3fb2b1b7c913538aa74689a1b5841483db5c8bae92448d0bd00d1966b3dd6a7bd5890abb172676cdd40443153e375881ecf2fb90e7c86e4701165ca5816e7af953b5b8fd6e4a4b2a25cfee405897e20b472bc16da2c716db62c69eed04cbef2c167da60e1794bed98758ba0416fc93ac702beea0fd3266ec75489f80e982e9d7aef0bf111fcafed0f83d182cbcbd9e157a3b32f48868c9dbba9e055e59caaaf61fbfb189f2353142b18d2af35547731e7f4b1d4f28a1a78a0e7a43aef0a2072f1f8a11af6c043a6483cf1fc13e79a36c2704e0496a5a216178c01ad03e18363a982d9a44833758fdf8899ac4e83cfaf6354804e6788c7083db2c0f3aaa11a16b323e8c179924ea81d470c2234894401174b61ee1b9320edc7d8d09358a98d9a13f8f778cbb8ba3efc436206b7931d4ac51354426913f6b0e9dd94c4c13f9d875d84418386b1d1a398441711dac9835ba958fe7b77b8b37a38025f43e52876f982c09af7b8eee13d43fa352337a81db86da18f049cc31e9980a99da77585d801add560cbc720b43168a235b272b9d08b3a6ab0b0b7a71e9cde055e65dee6b5f7e1a00c5f73f8d43f7132ea212c7924b960080cb9c633518745c07245ad2ea5041386e7706f200cac200d0d94a6ecf51dabbcce542aa6dc7517d586e83e92d3bf7b3b65c89d01cf243d55ee2b666ff2ab50d31514522e3472ccb371702383bdda19f0e586dab1902990b7f36ade17c9300b1e404ce785ec7bb9a4c3ad534778c962b153b335f3ac95fad6d0458899d87848578285cbe479e64f45fca4a072e0704cc0934de975079c52a42d0a105bbb5ecf6771fedd95d2195bb7510668d4775656d4747a0cacf15defa19c7b9c2671b3ae4b7a841b01bf9f3d1491a1600e50db11fe4c4077032ffcdac5dbf08aeb0df6d0dc8f6e474d052443ce6c8dc8596965c696fa86955b59c0f8dcea64ef5d076a699eb6e68be4658b6cdb21bb6dea6be5213a69ed331221eafcd060b3b477696c07d171f644958ed401aa051b2dd5896f0cb7aee051da94ebf8e85852b418732b632f6aae4e2a9f8bcd1daad4c8111f53a74bebb438a5435f8a9f63a6c59ab4a5cecbc5d710f429301135f1e374ff8aba28ac39360c2b2c35b8aaa1d795ee7e3a39b1b5ea59d809c321fb84d3260cfd81fa22fccbb84073596fe8f24b276f2144c4cd0ffbd6b07e444e1298d8ab2a726e81b729ea91"}) open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) fsync(r0) 17:48:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x200000, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0xfffffffffffffbff) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x803, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7fff, 0x9, 0x6, 0x5, 0x0, 0x8, 0x800, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7, 0x2, 0xffff, 0xe, 0xa9, 0xee6f, 0x0, 0x80, 0x4, 0x1, 0x5, 0xfffffffffffffffd, 0x2, 0x0, 0x5a6, 0x1c, 0x1f, 0x2, 0x1007, 0xff, 0xf1, 0x37321579, 0x40, 0x1, 0x0, 0x5, 0xfffffffffffffffd, @perf_config_ext={0x8, 0x8001}, 0x200, 0x8962, 0xfff, 0x7, 0x3, 0x1, 0x8001}, r2, 0x9, r4, 0x9) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"74756e6c30000000130000108000"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, &(0x7f0000000080), 0x0) r5 = accept$packet(r4, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @pic={0x7f, 0x8000, 0x9, 0x1, 0x1, 0x6f8, 0x0, 0x10000000200000, 0x2, 0xfffffffffffffffc, 0x8, 0x1000, 0x2, 0x2, 0xfffffffffffffffb, 0x101}}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000540)={0x4, 0x0, &(0x7f0000016000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000e80)={{0x7, 0x2, 0xf13, 0x1, '\x00', 0xc4}, 0x0, [0x3ff, 0xe0000, 0x2, 0xffff, 0xad4, 0x1, 0x3, 0x81, 0x8, 0x100000001, 0x0, 0x1000, 0x1dc, 0x6, 0x7, 0x8, 0x2, 0x8, 0xca8b, 0x6, 0x10001, 0x80000000, 0x60, 0x3f, 0x4, 0x7fff, 0x65, 0x62c, 0x6, 0x5, 0x26b3, 0x8, 0x400, 0x1, 0x81, 0x5, 0x1189, 0x401, 0x0, 0x4, 0x5, 0xc4, 0xc9e9, 0x3f, 0x4, 0x7, 0xaff1, 0x0, 0x0, 0x5, 0x0, 0x7, 0x5, 0x8, 0x2, 0x4, 0x800, 0x3, 0x200, 0x7, 0x9, 0x7, 0x1, 0x2, 0x6, 0x7, 0xc45, 0x10000, 0x356, 0x100000001, 0x400, 0x7fffffff, 0xffffffffffffffc1, 0x8000, 0x7, 0x7fffffff, 0xe8, 0x3, 0x3f, 0x1e54, 0x80000000, 0x0, 0x0, 0x4, 0x1000, 0x4, 0x2, 0x7017, 0x4, 0x4, 0x8e09, 0xffffffff, 0x1f, 0x0, 0x4150c28a, 0x3, 0x3f, 0x6, 0xb2ae, 0x0, 0x1, 0x2, 0x7, 0x6, 0x8, 0xffff, 0x10000, 0x3, 0x2, 0x9c, 0x4, 0x1, 0x7a0bc7d5, 0x9416, 0x3ff, 0x100000001, 0xffff, 0x5837, 0x9, 0x9, 0x9, 0x8001, 0x15e, 0x7, 0x9, 0x6, 0x9, 0x5], {r7, r8+30000000}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000740)={0x0, 0x1}, &(0x7f0000000780)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000000800)=[{&(0x7f00000005c0)=@in6={0xa, 0x4e24, 0x9, @mcast1, 0x40}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000600)="8185ba703e96b2a9fc49222162fc64eae76ddd26b93e3c9e604c6612268fb0414aaac3b525b4a3c4f2fdb47f606603b4f450def1c5bacfc5b685f5f82bc8809d6279195ce798fd417866362179fabb43255e7d25f64dbc6a0ab2e49a8f30a7791bab8dbad25af10d7da9d98599f7cdc09e365c2d744fdb15f96968a89208914e8512fb05083f896781b2036e9e6514b04c3350293021c1cf8be15ae29b27fc7a6698f5c5e56ef86ce52a173057f99a437ff55297e651e809c23d6f981662dee8ad0b4596720fa2a70f", 0xc9}], 0x1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=r9], 0x30}], 0x1, 0x1) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x30400, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000840)={r11, r12+30000000}, &(0x7f0000000880)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x7e0, @remote}, @in6={0xa, 0x4e22, 0x9, @remote, 0x7fff}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e20, 0x7, @mcast1, 0x3ff}, @in6={0xa, 0x4e20, 0xd1, @ipv4={[], [], @multicast1}, 0x3}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x8, @remote, 0xfff}], 0xac) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') dup(r6) 17:48:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:21 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x41) connect$vsock_dgram(r1, &(0x7f0000000280)={0x28, 0x0, 0x40000002712, @host}, 0x10) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x4, 0x0, 0x8000, 0x1, 0x3, 0x0, 0x7, 0x3e6, 0x40, 0xd7, 0x2, 0x2, 0x38, 0x9, 0x8, 0x3, 0x100000000}, [{0x6474e557, 0xd0f, 0xffffffffffffff5b, 0x4, 0x200, 0x0, 0x8, 0x7}], "7dfbafb5bea3ae1c4d6c6b8a2bcce68ff805d5d5bcec0b53a3e5c542f0ab5b60948b082ca2a4049f015084bebcadcdc8e8302d54f9d5bf1e94d9c8938b1ffc85742f9a2090b225c09e9e20fbb24ad0fbbe415513f7d80bd844e67c1c6389f773ba42bb17df88a473512be291988eb5b4932aaf0bb82b3f14f8a30e123d91bd5dece392d5c180", [[], []]}, 0x2fe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4$inet6(r0, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @multicast2}}, [0x1, 0x1000, 0x7, 0x6, 0x99ba, 0x1, 0x9, 0x5bc19b16, 0x7, 0xffd, 0x3, 0x40, 0x9, 0x3f, 0xf7b]}, &(0x7f0000000040)=0x100) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000005c0)=0x1) eventfd(0x5) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r3, 0xfffffffffffffffb, 0x1, 0x81, 0x7, 0xff}, &(0x7f00000000c0)=0x14) read(r2, &(0x7f0000367fe4)=""/91, 0xfffffffffffffcb8) 17:48:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001c80)={"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"}) open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) fsync(r0) 17:48:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) [ 298.243037] QAT: Invalid ioctl 17:48:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:21 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 298.322917] kvm: pic: level sensitive irq not supported [ 298.323270] kvm: pic: level sensitive irq not supported 17:48:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 298.412642] kvm: pic: level sensitive irq not supported [ 298.412984] kvm: pic: level sensitive irq not supported 17:48:21 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa0008000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 298.457971] kvm: pic: level sensitive irq not supported [ 298.460136] kvm: pic: level sensitive irq not supported 17:48:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001c80)={"9b2e8292a86c26ef6cfceafc38cbd6b30fb01c31708c4af7417eeb244579f579996a2982273e6229b96c1028ed2a933aade600fd3dd3e9d776343a0a6a8c90058b4a0762887941a9eb6c2816f46b1c63260c592d10867ca13013ee846199085247d718750c0ff774f5402eeaae448a8d5219c12c1048b9419abb4c5202fb80f9a60cf3a6a2ba50754b997bc1480aecbd590e2047b81e0def56faadd3fb2b1b7c913538aa74689a1b5841483db5c8bae92448d0bd00d1966b3dd6a7bd5890abb172676cdd40443153e375881ecf2fb90e7c86e4701165ca5816e7af953b5b8fd6e4a4b2a25cfee405897e20b472bc16da2c716db62c69eed04cbef2c167da60e1794bed98758ba0416fc93ac702beea0fd3266ec75489f80e982e9d7aef0bf111fcafed0f83d182cbcbd9e157a3b32f48868c9dbba9e055e59caaaf61fbfb189f2353142b18d2af35547731e7f4b1d4f28a1a78a0e7a43aef0a2072f1f8a11af6c043a6483cf1fc13e79a36c2704e0496a5a216178c01ad03e18363a982d9a44833758fdf8899ac4e83cfaf6354804e6788c7083db2c0f3aaa11a16b323e8c179924ea81d470c2234894401174b61ee1b9320edc7d8d09358a98d9a13f8f778cbb8ba3efc436206b7931d4ac51354426913f6b0e9dd94c4c13f9d875d84418386b1d1a398441711dac9835ba958fe7b77b8b37a38025f43e52876f982c09af7b8eee13d43fa352337a81db86da18f049cc31e9980a99da77585d801add560cbc720b43168a235b272b9d08b3a6ab0b0b7a71e9cde055e65dee6b5f7e1a00c5f73f8d43f7132ea212c7924b960080cb9c633518745c07245ad2ea5041386e7706f200cac200d0d94a6ecf51dabbcce542aa6dc7517d586e83e92d3bf7b3b65c89d01cf243d55ee2b666ff2ab50d31514522e3472ccb371702383bdda19f0e586dab1902990b7f36ade17c9300b1e404ce785ec7bb9a4c3ad534778c962b153b335f3ac95fad6d0458899d87848578285cbe479e64f45fca4a072e0704cc0934de975079c52a42d0a105bbb5ecf6771fedd95d2195bb7510668d4775656d4747a0cacf15defa19c7b9c2671b3ae4b7a841b01bf9f3d1491a1600e50db11fe4c4077032ffcdac5dbf08aeb0df6d0dc8f6e474d052443ce6c8dc8596965c696fa86955b59c0f8dcea64ef5d076a699eb6e68be4658b6cdb21bb6dea6be5213a69ed331221eafcd060b3b477696c07d171f644958ed401aa051b2dd5896f0cb7aee051da94ebf8e85852b418732b632f6aae4e2a9f8bcd1daad4c8111f53a74bebb438a5435f8a9f63a6c59ab4a5cecbc5d710f429301135f1e374ff8aba28ac39360c2b2c35b8aaa1d795ee7e3a39b1b5ea59d809c321fb84d3260cfd81fa22fccbb84073596fe8f24b276f2144c4cd0ffbd6b07e444e1298d8ab2a726e81b729ea91"}) fsync(r0) 17:48:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 298.909070] QAT: Invalid ioctl 17:48:22 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x200000, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0xfffffffffffffbff) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x803, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7fff, 0x9, 0x6, 0x5, 0x0, 0x8, 0x800, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7, 0x2, 0xffff, 0xe, 0xa9, 0xee6f, 0x0, 0x80, 0x4, 0x1, 0x5, 0xfffffffffffffffd, 0x2, 0x0, 0x5a6, 0x1c, 0x1f, 0x2, 0x1007, 0xff, 0xf1, 0x37321579, 0x40, 0x1, 0x0, 0x5, 0xfffffffffffffffd, @perf_config_ext={0x8, 0x8001}, 0x200, 0x8962, 0xfff, 0x7, 0x3, 0x1, 0x8001}, r2, 0x9, r4, 0x9) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"74756e6c30000000130000108000"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, &(0x7f0000000080), 0x0) r5 = accept$packet(r4, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @pic={0x7f, 0x8000, 0x9, 0x1, 0x1, 0x6f8, 0x0, 0x10000000200000, 0x2, 0xfffffffffffffffc, 0x8, 0x1000, 0x2, 0x2, 0xfffffffffffffffb, 0x101}}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000540)={0x4, 0x0, &(0x7f0000016000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000e80)={{0x7, 0x2, 0xf13, 0x1, '\x00', 0xc4}, 0x0, [0x3ff, 0xe0000, 0x2, 0xffff, 0xad4, 0x1, 0x3, 0x81, 0x8, 0x100000001, 0x0, 0x1000, 0x1dc, 0x6, 0x7, 0x8, 0x2, 0x8, 0xca8b, 0x6, 0x10001, 0x80000000, 0x60, 0x3f, 0x4, 0x7fff, 0x65, 0x62c, 0x6, 0x5, 0x26b3, 0x8, 0x400, 0x1, 0x81, 0x5, 0x1189, 0x401, 0x0, 0x4, 0x5, 0xc4, 0xc9e9, 0x3f, 0x4, 0x7, 0xaff1, 0x0, 0x0, 0x5, 0x0, 0x7, 0x5, 0x8, 0x2, 0x4, 0x800, 0x3, 0x200, 0x7, 0x9, 0x7, 0x1, 0x2, 0x6, 0x7, 0xc45, 0x10000, 0x356, 0x100000001, 0x400, 0x7fffffff, 0xffffffffffffffc1, 0x8000, 0x7, 0x7fffffff, 0xe8, 0x3, 0x3f, 0x1e54, 0x80000000, 0x0, 0x0, 0x4, 0x1000, 0x4, 0x2, 0x7017, 0x4, 0x4, 0x8e09, 0xffffffff, 0x1f, 0x0, 0x4150c28a, 0x3, 0x3f, 0x6, 0xb2ae, 0x0, 0x1, 0x2, 0x7, 0x6, 0x8, 0xffff, 0x10000, 0x3, 0x2, 0x9c, 0x4, 0x1, 0x7a0bc7d5, 0x9416, 0x3ff, 0x100000001, 0xffff, 0x5837, 0x9, 0x9, 0x9, 0x8001, 0x15e, 0x7, 0x9, 0x6, 0x9, 0x5], {r7, r8+30000000}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000740)={0x0, 0x1}, &(0x7f0000000780)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000000800)=[{&(0x7f00000005c0)=@in6={0xa, 0x4e24, 0x9, @mcast1, 0x40}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000600)="8185ba703e96b2a9fc49222162fc64eae76ddd26b93e3c9e604c6612268fb0414aaac3b525b4a3c4f2fdb47f606603b4f450def1c5bacfc5b685f5f82bc8809d6279195ce798fd417866362179fabb43255e7d25f64dbc6a0ab2e49a8f30a7791bab8dbad25af10d7da9d98599f7cdc09e365c2d744fdb15f96968a89208914e8512fb05083f896781b2036e9e6514b04c3350293021c1cf8be15ae29b27fc7a6698f5c5e56ef86ce52a173057f99a437ff55297e651e809c23d6f981662dee8ad0b4596720fa2a70f", 0xc9}], 0x1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=r9], 0x30}], 0x1, 0x1) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x30400, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000840)={r11, r12+30000000}, &(0x7f0000000880)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x7e0, @remote}, @in6={0xa, 0x4e22, 0x9, @remote, 0x7fff}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e20, 0x7, @mcast1, 0x3ff}, @in6={0xa, 0x4e20, 0xd1, @ipv4={[], [], @multicast1}, 0x3}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x8, @remote, 0xfff}], 0xac) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') dup(r6) 17:48:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0ffffffff, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:22 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="a0"], 0x1) 17:48:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = shmget(0x0, 0x4000, 0x78000400, &(0x7f0000ffa000/0x4000)=nil) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x48, 0x20000) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000000c0)) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/92) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) fsync(r0) [ 299.138809] QAT: Invalid ioctl 17:48:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x700000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:22 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="06"], 0x1) [ 299.233158] kvm: pic: level sensitive irq not supported [ 299.233492] kvm: pic: level sensitive irq not supported 17:48:22 executing program 2: syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x100000001, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f0000000000)=""/215, 0xd7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000300)=0x1e, 0x4) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000340)=ANY=[@ANYBLOB="040000000e000000a330ccd4aa52b9fba9cdaf346b25011cd7f3766a6afe351014206471ea88"]) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @local}}, 0x2, 0xfffffffffffffffb, 0x0, 0xfffffffffffffffe, 0x10}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000280)={r3, 0x0, &(0x7f0000000240)}, &(0x7f00000002c0)=0x10) read(0xffffffffffffffff, &(0x7f0000367fe4)=""/91, 0x275) [ 299.298559] kvm: pic: level sensitive irq not supported [ 299.298891] kvm: pic: level sensitive irq not supported 17:48:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 299.629218] EXT4-fs: 11 callbacks suppressed [ 299.629230] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x200000, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0xfffffffffffffbff) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x803, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7fff, 0x9, 0x6, 0x5, 0x0, 0x8, 0x800, 0x3, 0x8, 0x0, 0x7, 0x7, 0x7, 0x2, 0xffff, 0xe, 0xa9, 0xee6f, 0x0, 0x80, 0x4, 0x1, 0x5, 0xfffffffffffffffd, 0x2, 0x0, 0x5a6, 0x1c, 0x1f, 0x2, 0x1007, 0xff, 0xf1, 0x37321579, 0x40, 0x1, 0x0, 0x5, 0xfffffffffffffffd, @perf_config_ext={0x8, 0x8001}, 0x200, 0x8962, 0xfff, 0x7, 0x3, 0x1, 0x8001}, r2, 0x9, r4, 0x9) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"74756e6c30000000130000108000"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, &(0x7f0000000080), 0x0) r5 = accept$packet(r4, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @pic={0x7f, 0x8000, 0x9, 0x1, 0x1, 0x6f8, 0x0, 0x10000000200000, 0x2, 0xfffffffffffffffc, 0x8, 0x1000, 0x2, 0x2, 0xfffffffffffffffb, 0x101}}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000540)={0x4, 0x0, &(0x7f0000016000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000e80)={{0x7, 0x2, 0xf13, 0x1, '\x00', 0xc4}, 0x0, [0x3ff, 0xe0000, 0x2, 0xffff, 0xad4, 0x1, 0x3, 0x81, 0x8, 0x100000001, 0x0, 0x1000, 0x1dc, 0x6, 0x7, 0x8, 0x2, 0x8, 0xca8b, 0x6, 0x10001, 0x80000000, 0x60, 0x3f, 0x4, 0x7fff, 0x65, 0x62c, 0x6, 0x5, 0x26b3, 0x8, 0x400, 0x1, 0x81, 0x5, 0x1189, 0x401, 0x0, 0x4, 0x5, 0xc4, 0xc9e9, 0x3f, 0x4, 0x7, 0xaff1, 0x0, 0x0, 0x5, 0x0, 0x7, 0x5, 0x8, 0x2, 0x4, 0x800, 0x3, 0x200, 0x7, 0x9, 0x7, 0x1, 0x2, 0x6, 0x7, 0xc45, 0x10000, 0x356, 0x100000001, 0x400, 0x7fffffff, 0xffffffffffffffc1, 0x8000, 0x7, 0x7fffffff, 0xe8, 0x3, 0x3f, 0x1e54, 0x80000000, 0x0, 0x0, 0x4, 0x1000, 0x4, 0x2, 0x7017, 0x4, 0x4, 0x8e09, 0xffffffff, 0x1f, 0x0, 0x4150c28a, 0x3, 0x3f, 0x6, 0xb2ae, 0x0, 0x1, 0x2, 0x7, 0x6, 0x8, 0xffff, 0x10000, 0x3, 0x2, 0x9c, 0x4, 0x1, 0x7a0bc7d5, 0x9416, 0x3ff, 0x100000001, 0xffff, 0x5837, 0x9, 0x9, 0x9, 0x8001, 0x15e, 0x7, 0x9, 0x6, 0x9, 0x5], {r7, r8+30000000}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000740)={0x0, 0x1}, &(0x7f0000000780)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000000800)=[{&(0x7f00000005c0)=@in6={0xa, 0x4e24, 0x9, @mcast1, 0x40}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000600)="8185ba703e96b2a9fc49222162fc64eae76ddd26b93e3c9e604c6612268fb0414aaac3b525b4a3c4f2fdb47f606603b4f450def1c5bacfc5b685f5f82bc8809d6279195ce798fd417866362179fabb43255e7d25f64dbc6a0ab2e49a8f30a7791bab8dbad25af10d7da9d98599f7cdc09e365c2d744fdb15f96968a89208914e8512fb05083f896781b2036e9e6514b04c3350293021c1cf8be15ae29b27fc7a6698f5c5e56ef86ce52a173057f99a437ff55297e651e809c23d6f981662dee8ad0b4596720fa2a70f", 0xc9}], 0x1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=r9], 0x30}], 0x1, 0x1) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x30400, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000840)={r11, r12+30000000}, &(0x7f0000000880)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x7e0, @remote}, @in6={0xa, 0x4e22, 0x9, @remote, 0x7fff}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e20, 0x7, @mcast1, 0x3ff}, @in6={0xa, 0x4e20, 0xd1, @ipv4={[], [], @multicast1}, 0x3}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x8, @remote, 0xfff}], 0xac) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') dup(r6) 17:48:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xad00, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:22 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) fsync(0xffffffffffffffff) 17:48:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 299.878408] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:23 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:23 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 299.997174] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 300.026972] QAT: Invalid ioctl [ 300.092061] *** Guest State *** [ 300.095521] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 300.136400] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 300.150589] CR3 = 0x0000000000000000 [ 300.154625] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 300.163936] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 300.173599] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 17:48:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400400) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f00000000c0)={r3, 0x10}) 17:48:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:23 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="10"], 0x1) 17:48:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 300.182246] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 300.191334] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 300.214323] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 300.225108] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 300.247736] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 300.255773] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 300.294779] kauditd_printk_skb: 38 callbacks suppressed [ 300.294796] audit: type=1804 audit(1539712103.365:112): pid=10073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/108/file0" dev="sda1" ino=16568 res=1 [ 300.299295] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 300.336146] audit: type=1804 audit(1539712103.405:113): pid=10077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/108/file0" dev="sda1" ino=16568 res=1 [ 300.357050] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 300.369563] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 300.382660] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 300.408075] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 300.419574] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 300.431368] Interruptibility = 00000000 ActivityState = 00000000 [ 300.439328] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 300.450412] *** Host State *** [ 300.453829] RIP = 0xffffffff811f9ef3 RSP = 0xffff88017eee7390 [ 300.460204] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 300.466912] FSBase=00007fc7030d1700 GSBase=ffff8801dae00000 TRBase=fffffe0000033000 [ 300.475493] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 300.481817] CR0=0000000080050033 CR3=00000001d7c3e000 CR4=00000000001426f0 [ 300.488933] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87c01360 [ 300.488948] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 300.488958] *** Control State *** [ 300.501746] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000cb [ 300.501756] EntryControls=0000d1ff ExitControls=002fefff [ 300.501771] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 300.501781] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 300.501790] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 300.501799] reason=80000021 qualification=0000000000000000 [ 300.501812] IDTVectoring: info=00000000 errcode=00000000 [ 300.547339] TSC Offset = 0xffffff5d296ed793 [ 300.553866] TPR Threshold = 0x00 [ 300.553877] EPT pointer = 0x00000001d8cf001e [ 300.565475] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:23 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x300000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:23 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 17:48:23 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x500000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 300.759860] audit: type=1804 audit(1539712103.835:114): pid=10094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/109/file0" dev="sda1" ino=16548 res=1 17:48:23 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f5"], 0x1) [ 300.834406] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)={0x20000000000000, 0x81, 0x7, 0x0, 0x0, [{r1, 0x0, 0x7}, {r2, 0x0, 0x4}, {r1, 0x0, 0x9}, {r0, 0x0, 0xff}, {r1}, {r1, 0x0, 0x1}, {r1, 0x0, 0x5}]}) read(r2, &(0x7f0000367fe4)=""/91, 0x275) [ 300.873365] audit: type=1804 audit(1539712103.855:115): pid=10100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/109/file0" dev="sda1" ino=16548 res=1 [ 300.881777] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:24 executing program 1: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 301.001768] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 301.015444] audit: type=1804 audit(1539712104.085:116): pid=10120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/110/file0" dev="sda1" ino=16657 res=1 17:48:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@hopopts={0x87, 0xd, [], [@ra={0x5, 0x2, 0x4e3}, @jumbo={0xc2, 0x4, 0x8f3}, @generic={0x2, 0x29, "1bd9b2b2ae27164acd9aed3275c76d52a6c103a79eaa34a8a198ec93868f565940219908068f2e320e"}, @enc_lim={0x4, 0x1, 0x5}, @jumbo={0xc2, 0x4, 0x5}, @hao={0xc9, 0x10, @loopback}, @jumbo={0xc2, 0x4, 0xb7}, @hao={0xc9, 0x10, @remote}, @jumbo={0xc2, 0x4, 0x800}]}, 0x78) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x14) listen(r0, 0x800000002) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x80020}, 0xc) sendto$inet6(r1, &(0x7f00000001c0)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000400)={0x10}, 0x14090) 17:48:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r3 = dup(r0) ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000000000)=0x2800000000000000) mknod(&(0x7f0000000040)='./file0\x00', 0x1010, 0x4) 17:48:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(0xffffffffffffffff) 17:48:24 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 301.130383] audit: type=1804 audit(1539712104.135:117): pid=10129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/110/file0" dev="sda1" ino=16657 res=1 17:48:24 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) [ 301.256823] audit: type=1804 audit(1539712104.325:118): pid=10139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/111/file0" dev="sda1" ino=16598 res=1 [ 301.284724] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:24 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 301.354477] audit: type=1804 audit(1539712104.325:119): pid=10154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/111/file0" dev="sda1" ino=16598 res=1 17:48:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @broadcast}}]}, 0x110) sendto$inet(r0, &(0x7f0000000000)="f68579eba2b985080dba89a77143279b85f2cdc6a5372b9ca910cc1f68762663bdd8f0b8dcc5375a1e221ec4b44f4721cf079a98a6405594e6d99e63e0f4d22ec0ec3acda929e1d3ffa121f5fb7764a4f81c37496b887a608142a04e3da328114e623181ed7c429c815e208840e6380d9a090e566b1a86ed3eb31d17df7353597d250681815a779483828cda49f40ace651a47c20edc1900dedb2f6ab5650f4f8903fd55cb50587d51c2f4559688a58bccc83028a440d6dc80f4e177a606d1a869fbc2ca2ff9b15d9ee817d4516a87be9079f9fb553fcbc0415cc0c849e44804e8e132f9c54c14cd4a53e4155342", 0xee, 0x4000004, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) [ 301.405117] FAULT_INJECTION: forcing a failure. [ 301.405117] name failslab, interval 1, probability 0, space 0, times 0 [ 301.462280] audit: type=1804 audit(1539712104.515:120): pid=10167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/112/file0" dev="sda1" ino=16535 res=1 [ 301.502106] CPU: 1 PID: 10164 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 301.510652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.520045] Call Trace: [ 301.522691] dump_stack+0x244/0x39d [ 301.526349] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.531593] should_fail.cold.4+0xa/0x17 [ 301.535681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.537902] audit: type=1804 audit(1539712104.515:121): pid=10168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/112/file0" dev="sda1" ino=16535 res=1 [ 301.540806] ? lock_unpin_lock+0x4a0/0x4a0 [ 301.540865] ? print_usage_bug+0xc0/0xc0 [ 301.540892] ? __lock_acquire+0x62f/0x4c20 [ 301.577308] ? print_usage_bug+0xc0/0xc0 [ 301.581379] ? ima_get_action+0x7e/0xa0 [ 301.585370] ? zap_class+0x640/0x640 [ 301.589110] ? mark_held_locks+0x130/0x130 [ 301.593364] ? __lock_is_held+0xb5/0x140 [ 301.597476] __should_failslab+0x124/0x180 [ 301.601735] ? mempool_free+0x370/0x370 [ 301.605723] should_failslab+0x9/0x14 17:48:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 301.609552] kmem_cache_alloc+0x47/0x730 [ 301.613643] ? mempool_free+0x370/0x370 [ 301.617635] mempool_alloc_slab+0x44/0x60 [ 301.621798] mempool_alloc+0x193/0x4a0 [ 301.625733] ? mempool_destroy+0x30/0x30 [ 301.629829] ? __lock_acquire+0x62f/0x4c20 [ 301.634079] ? mark_held_locks+0x130/0x130 [ 301.638344] ? __lock_is_held+0xb5/0x140 [ 301.642495] bio_alloc_bioset+0x3a2/0x6f0 [ 301.646663] ? bvec_alloc+0x2d0/0x2d0 [ 301.650479] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.655986] ? kasan_check_read+0x11/0x20 [ 301.660146] submit_bh_wbc+0x133/0x7c0 [ 301.664018] ? __might_sleep+0x95/0x190 [ 301.668018] write_dirty_buffer+0xb5/0x150 [ 301.672240] fsync_buffers_list+0x401/0xce0 [ 301.676612] ? _kstrtoull+0x188/0x250 [ 301.680414] ? zap_class+0x5f1/0x640 [ 301.684118] ? write_dirty_buffer+0x150/0x150 [ 301.688603] ? find_held_lock+0x36/0x1c0 [ 301.692658] ? find_held_lock+0x36/0x1c0 [ 301.696712] ? errseq_check+0xe2/0x150 [ 301.700593] ? lock_acquire+0x1ed/0x520 [ 301.704568] ? __generic_file_fsync+0xb5/0x200 [ 301.709142] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.714594] ? __bpf_trace_file_check_and_advance_wb_err+0x30/0x30 [ 301.720913] sync_mapping_buffers+0x113/0x190 [ 301.725402] ? down_write+0x8a/0x130 [ 301.729105] ? fsync_buffers_list+0xce0/0xce0 [ 301.733595] ? down_read+0x120/0x120 [ 301.737368] __generic_file_fsync+0xdf/0x200 [ 301.741781] ext4_sync_file+0xa45/0x1500 [ 301.745838] ? ext4_getfsmap+0xd70/0xd70 [ 301.749908] ? fget_raw+0x20/0x20 [ 301.753366] ? __sb_end_write+0xd9/0x110 [ 301.757420] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.762962] ? fput+0x130/0x1a0 [ 301.766232] ? do_syscall_64+0x9a/0x820 [ 301.770216] ? do_syscall_64+0x9a/0x820 [ 301.774178] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 301.778750] ? ext4_getfsmap+0xd70/0xd70 [ 301.782855] vfs_fsync_range+0x140/0x220 [ 301.786915] do_fsync+0x52/0xa0 [ 301.790186] __x64_sys_fsync+0x33/0x40 [ 301.794066] do_syscall_64+0x1b9/0x820 [ 301.797955] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.803309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.808227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.813066] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.818076] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.823093] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.828114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.832948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.838126] RIP: 0033:0x457569 [ 301.841307] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.860204] RSP: 002b:00007f0ac9678c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004a [ 301.867904] RAX: ffffffffffffffda RBX: 00007f0ac9678c90 RCX: 0000000000457569 [ 301.875162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 301.882436] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.889718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ac96796d4 [ 301.896979] R13: 00000000004bde4b R14: 00000000004cccd0 R15: 0000000000000004 17:48:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:25 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:25 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffbbfffffff, 0x6, 0x0, @buffer={0x0, 0xe9, &(0x7f0000000080)=""/233}, &(0x7f00000002c0)="9b247f9c1793", &(0x7f0000000240)=""/126, 0x0, 0x0, 0x0, &(0x7f0000000480)}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x54000, 0x28) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, r0, 0x0) read(r0, &(0x7f0000000380)=""/42, 0xf0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xb32, 0x100) ioctl$KDDISABIO(r2, 0x4b37) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000180)) 17:48:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000001c0)=""/91, 0x5b) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x80400, 0x0) accept4$nfc_llcp(r2, &(0x7f0000000140), &(0x7f00000000c0)=0x60, 0x800) 17:48:25 executing program 1 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 302.067080] FAULT_INJECTION: forcing a failure. [ 302.067080] name failslab, interval 1, probability 0, space 0, times 0 [ 302.097181] CPU: 0 PID: 10194 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 302.105740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.115110] Call Trace: [ 302.117719] dump_stack+0x244/0x39d [ 302.121382] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.126638] should_fail.cold.4+0xa/0x17 [ 302.130736] ? __lock_acquire+0x62f/0x4c20 [ 302.134992] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.140117] ? mark_held_locks+0x130/0x130 [ 302.144378] ? mark_held_locks+0x130/0x130 [ 302.148634] ? __lock_acquire+0x62f/0x4c20 [ 302.152877] ? __lock_acquire+0x62f/0x4c20 [ 302.157143] ? print_usage_bug+0xc0/0xc0 [ 302.161242] ? find_held_lock+0x36/0x1c0 [ 302.165328] ? zap_class+0x640/0x640 [ 302.169049] ? mark_held_locks+0x130/0x130 [ 302.173287] ? zap_class+0x640/0x640 [ 302.177009] ? mark_held_locks+0x130/0x130 [ 302.181295] __should_failslab+0x124/0x180 [ 302.185547] should_failslab+0x9/0x14 [ 302.189362] kmem_cache_alloc_node+0x56/0x730 [ 302.193878] ? check_preemption_disabled+0x48/0x280 [ 302.198913] create_task_io_context+0xbd/0x580 [ 302.203501] ? ioc_clear_queue+0x610/0x610 [ 302.207746] ? generic_make_request_checks+0x11f1/0x2170 [ 302.213212] ? lock_downgrade+0x900/0x900 [ 302.217368] ? check_preemption_disabled+0x48/0x280 [ 302.222398] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 302.227332] ? kasan_check_read+0x11/0x20 [ 302.231492] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 302.236778] ? rcu_softirq_qs+0x20/0x20 [ 302.240770] generic_make_request_checks+0x1bd5/0x2170 [ 302.246077] ? trace_event_raw_event_block_rq_requeue+0x6d0/0x6d0 [ 302.252322] ? __lock_acquire+0x62f/0x4c20 [ 302.256581] ? save_stack+0x43/0xd0 [ 302.260212] ? kasan_slab_alloc+0x12/0x20 [ 302.264361] ? kmem_cache_alloc+0x12e/0x730 [ 302.268711] ? mempool_alloc_slab+0x44/0x60 [ 302.273061] ? mempool_alloc+0x193/0x4a0 [ 302.277133] ? bio_alloc_bioset+0x3a2/0x6f0 [ 302.281457] ? submit_bh_wbc+0x133/0x7c0 [ 302.285524] ? write_dirty_buffer+0xb5/0x150 [ 302.289950] ? fsync_buffers_list+0x401/0xce0 [ 302.294449] ? sync_mapping_buffers+0x113/0x190 [ 302.299121] ? __generic_file_fsync+0xdf/0x200 [ 302.303723] ? mark_held_locks+0x130/0x130 [ 302.307973] ? zap_class+0x640/0x640 [ 302.311700] ? zap_class+0x640/0x640 [ 302.315429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.320976] ? check_preemption_disabled+0x48/0x280 [ 302.326008] generic_make_request+0x2c7/0x18a0 [ 302.330603] ? blk_get_request+0x800/0x800 [ 302.334847] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.339876] ? zap_class+0x640/0x640 [ 302.343595] ? zap_class+0x640/0x640 [ 302.347322] ? mempool_alloc_slab+0x44/0x60 [ 302.351689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.357231] ? check_preemption_disabled+0x48/0x280 [ 302.362285] ? find_held_lock+0x36/0x1c0 [ 302.366363] ? guard_bio_eod+0x1ee/0x630 [ 302.370437] ? lock_downgrade+0x900/0x900 [ 302.374590] ? check_preemption_disabled+0x48/0x280 [ 302.379628] submit_bio+0xba/0x460 [ 302.383179] ? submit_bio+0xba/0x460 [ 302.386901] ? rcu_softirq_qs+0x20/0x20 [ 302.390887] ? generic_make_request+0x18a0/0x18a0 [ 302.395744] ? __bio_add_page+0x128/0x280 [ 302.399932] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 302.404958] ? guard_bio_eod+0x2b5/0x630 [ 302.409029] submit_bh_wbc+0x5dc/0x7c0 [ 302.412929] write_dirty_buffer+0xb5/0x150 [ 302.417186] fsync_buffers_list+0x401/0xce0 [ 302.421511] ? _kstrtoull+0x188/0x250 [ 302.425337] ? zap_class+0x5f1/0x640 [ 302.429082] ? write_dirty_buffer+0x150/0x150 [ 302.434068] ? find_held_lock+0x36/0x1c0 [ 302.438150] ? find_held_lock+0x36/0x1c0 [ 302.442222] ? errseq_check+0xe2/0x150 [ 302.446146] ? lock_acquire+0x1ed/0x520 [ 302.450127] ? __generic_file_fsync+0xb5/0x200 [ 302.454730] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.460192] ? __bpf_trace_file_check_and_advance_wb_err+0x30/0x30 [ 302.466535] sync_mapping_buffers+0x113/0x190 [ 302.471053] ? down_write+0x8a/0x130 [ 302.474775] ? fsync_buffers_list+0xce0/0xce0 [ 302.479281] ? down_read+0x120/0x120 [ 302.483016] __generic_file_fsync+0xdf/0x200 [ 302.487440] ext4_sync_file+0xa45/0x1500 [ 302.491519] ? ext4_getfsmap+0xd70/0xd70 [ 302.495617] ? fget_raw+0x20/0x20 [ 302.499109] ? __sb_end_write+0xd9/0x110 [ 302.503247] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.508790] ? fput+0x130/0x1a0 [ 302.512076] ? do_syscall_64+0x9a/0x820 [ 302.516057] ? do_syscall_64+0x9a/0x820 [ 302.520861] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 302.525471] ? ext4_getfsmap+0xd70/0xd70 [ 302.529554] vfs_fsync_range+0x140/0x220 [ 302.533820] do_fsync+0x52/0xa0 [ 302.537114] __x64_sys_fsync+0x33/0x40 [ 302.541007] do_syscall_64+0x1b9/0x820 [ 302.544915] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.550286] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.555219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.560068] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.565257] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.570310] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.575336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.580190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.585381] RIP: 0033:0x457569 [ 302.588612] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.607535] RSP: 002b:00007f0ac9678c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004a 17:48:25 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0x3000, 0x102000}) 17:48:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a0ffffffff, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:25 executing program 3: r0 = memfd_create(&(0x7f0000001440)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0xb1d, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}, {}], 0x48) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x21e, @time}) [ 302.615259] RAX: ffffffffffffffda RBX: 00007f0ac9678c90 RCX: 0000000000457569 [ 302.622531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 302.629842] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 302.637110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ac96796d4 [ 302.644380] R13: 00000000004bde4b R14: 00000000004cccd0 R15: 0000000000000004 17:48:25 executing program 1 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 302.815313] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:25 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 302.858641] FAULT_INJECTION: forcing a failure. [ 302.858641] name failslab, interval 1, probability 0, space 0, times 0 [ 302.909400] CPU: 1 PID: 10224 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 302.917958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.927320] Call Trace: [ 302.929945] dump_stack+0x244/0x39d [ 302.933619] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.938846] should_fail.cold.4+0xa/0x17 [ 302.942932] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.948047] ? zap_class+0x640/0x640 [ 302.951803] ? __lock_is_held+0xb5/0x140 [ 302.955888] ? zap_class+0x640/0x640 [ 302.959623] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.965119] ? __lock_is_held+0xb5/0x140 [ 302.969215] __should_failslab+0x124/0x180 [ 302.973466] ? mempool_free+0x370/0x370 [ 302.977454] should_failslab+0x9/0x14 [ 302.981270] kmem_cache_alloc+0x47/0x730 [ 302.985353] ? mempool_free+0x370/0x370 [ 302.989352] mempool_alloc_slab+0x44/0x60 [ 302.993526] mempool_alloc+0x193/0x4a0 [ 302.997460] ? __switch_to_asm+0x34/0x70 [ 302.997486] ? mempool_destroy+0x30/0x30 [ 302.997509] ? pagevec_lookup_range_tag+0x40/0x80 [ 303.005663] ? __lock_is_held+0xb5/0x140 [ 303.014600] bio_alloc_bioset+0x3a2/0x6f0 [ 303.018771] ? bvec_alloc+0x2d0/0x2d0 [ 303.022590] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.028068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.033623] ? __ext4_get_inode_loc+0x470/0x1330 [ 303.038402] submit_bh_wbc+0x133/0x7c0 [ 303.042302] ? __might_sleep+0x95/0x190 [ 303.046309] __sync_dirty_buffer+0x1a6/0x3d0 [ 303.050724] ? sync_mapping_buffers+0x190/0x190 [ 303.055386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.060914] ? check_preemption_disabled+0x48/0x280 [ 303.065922] sync_dirty_buffer+0x1a/0x20 [ 303.069972] ext4_write_inode+0x417/0x4d0 [ 303.074119] ? ext4_iget_normal+0xe0/0xe0 [ 303.078277] __writeback_single_inode+0xf4a/0x1650 [ 303.083202] ? __mark_inode_dirty+0x1500/0x1500 [ 303.087859] ? zap_class+0x640/0x640 [ 303.091578] ? fsync_buffers_list+0x903/0xce0 [ 303.096103] ? find_held_lock+0x36/0x1c0 [ 303.100173] ? wbc_attach_and_unlock_inode+0x5c0/0xa30 [ 303.105436] ? lock_downgrade+0x900/0x900 [ 303.109574] ? lock_downgrade+0x900/0x900 [ 303.113728] ? check_preemption_disabled+0x48/0x280 [ 303.118738] ? kasan_check_read+0x11/0x20 [ 303.122889] ? do_raw_spin_unlock+0xa7/0x330 [ 303.127395] ? do_raw_spin_trylock+0x270/0x270 [ 303.131967] ? __lock_is_held+0xb5/0x140 [ 303.136025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.141573] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 303.146871] ? __writeback_single_inode+0x1650/0x1650 [ 303.152072] ? errseq_check+0xe2/0x150 [ 303.155952] writeback_single_inode+0x3c2/0x590 [ 303.160608] ? wb_writeback+0xfb0/0xfb0 [ 303.164570] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.170025] sync_inode_metadata+0x120/0x190 [ 303.174441] ? sync_inode+0x30/0x30 [ 303.178075] __generic_file_fsync+0x16f/0x200 [ 303.182572] ext4_sync_file+0xa45/0x1500 [ 303.186640] ? ext4_getfsmap+0xd70/0xd70 [ 303.190705] ? fget_raw+0x20/0x20 [ 303.194149] ? __sb_end_write+0xd9/0x110 [ 303.198202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.203725] ? fput+0x130/0x1a0 [ 303.207013] ? do_syscall_64+0x9a/0x820 [ 303.210975] ? do_syscall_64+0x9a/0x820 [ 303.214980] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 303.219560] ? ext4_getfsmap+0xd70/0xd70 [ 303.223623] vfs_fsync_range+0x140/0x220 [ 303.227716] do_fsync+0x52/0xa0 [ 303.230987] __x64_sys_fsync+0x33/0x40 [ 303.234876] do_syscall_64+0x1b9/0x820 [ 303.238764] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.244116] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.249034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.253881] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.258901] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.263935] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.268956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.273791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.278966] RIP: 0033:0x457569 [ 303.282164] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.301066] RSP: 002b:00007f0ac9678c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004a [ 303.308776] RAX: ffffffffffffffda RBX: 00007f0ac9678c90 RCX: 0000000000457569 [ 303.316054] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 303.323311] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.330607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ac96796d4 [ 303.337863] R13: 00000000004bde4b R14: 00000000004cccd0 R15: 0000000000000004 17:48:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000010]}) 17:48:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, "5b73797374656d73656c66706f7369785f61636c5f616363657373a747504c"}, {0x20, '-'}, {}, {}, {0x20, 'em0$$'}], 0xa, "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"}, 0x1035) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:26 executing program 1 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:26 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 303.484534] FAULT_INJECTION: forcing a failure. [ 303.484534] name failslab, interval 1, probability 0, space 0, times 0 17:48:26 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xffffffffffffff7f) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@mcast1, @loopback, @mcast1, 0x0, 0x8, 0x80000000, 0xfe, 0x0, 0xc0000}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x800) r4 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x7, 0x904c1) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f00000002c0)={0x6de3c1b372481460, r4}) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000580)={'vcan0\x00', {0x2, 0x4e24}}) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x2000000000000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7ff}, 0xb) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000700)={0x0, 0x5}, &(0x7f0000000740)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000780)={r5, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) accept4(r2, &(0x7f0000000500)=@ethernet={0x0, @remote}, &(0x7f0000000380)=0x80, 0x80800) openat$ppp(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ppp\x00', 0x80000, 0x0) sendto$inet6(r2, &(0x7f0000000b00)="588854ff6137b587bed59f95461b191b325e25b0dcb2be7a7ccb5fff692642af775cf73ca130eda693e1cabd00be37288d1e71e97e36ecdf3c26473759886f236fedc987b19c37b38e26ebb7f8b71b3c237b5bb1346000", 0x57, 0x2, &(0x7f000005ffe4)={0xa, 0x4e23, 0x1, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x20}, 0xc) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000a40)="684010c65bfed65c2ef58a7d6b19cfaa548950c406afa67f737cbf42558dd27cd930b42e7fe6762521376c0caea15469a7c202fdc8a2bf5dea0219390761d82ccddcd4d48dbef8054899b1e417abd11eea730de60fdc27753fa181e5f8850108264aa3f87640af6eafbad925c3ff82206dab0a96d789bc147bc28fbc8b06b0c91eb47ee4a341b26b7b8b7c89badda768ea0846db30e38aa8cb4878a5ce9c306be7", 0xa1}], 0x1) write$binfmt_misc(r2, &(0x7f0000000240)={'syz1'}, 0x34000) ioctl$KDSKBLED(r3, 0x4b65, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="20002abd7000fcdbdf250a0000000800060001040000ea6431a46a9659b128272c925b61f8709fee19d46f1d9d3128be4e99fcce5365bb05775b4822cc8e1cc4cf1907d45a68b6133caa69ddc8e453ed84e4d9cdfe0c3606f385fffa5852980b25ae7ab5510683915456d0ccdd059973c2974330937cd75d7a2f23f038e7d40577b230019144ce086e0f33be60f29445013581be1964bdeb6190ff69deaa610000000000"], 0x1}, 0x1, 0x0, 0x0, 0x24004000}, 0x4) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000880)=0x7fffffff) write$binfmt_misc(r2, &(0x7f0000000040)={'syz1'}, 0xffcf) write(r2, &(0x7f00000005c0)="9a", 0x1) r6 = accept4(r1, 0x0, &(0x7f0000000080), 0x0) write$binfmt_misc(r6, &(0x7f0000000600)={'syz0', "8eca763f94506b50f7e17a429ed706a41d780f2c6ef951a0f707c443d68c646996aec1ee5dd31de2b48648416fc78524fc8219910c1e090ad268108a4012a754f105338f955458e767af34552be4f1e85bd00592d62952eea38932cd06830d119766a8e2b2dd5621b38230bb3d61addd8c1926f34b0297d33ee408ea853d4e92a8084c7d882a8a0af043e28ad48459eb77c26ccd303163fc36614e298014c51356929575ae6eab22aebd8463f1dc2c823881cfea32cf628b8874f8eb7afc57c7a87285516d947bc8c2250952c5419b7c78d01b766dd1976251cc55794d"}, 0xe1) sendto$unix(r6, &(0x7f0000000180)="d4", 0x1, 0x0, 0x0, 0x0) [ 303.542988] CPU: 1 PID: 10251 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 303.551554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.551562] Call Trace: [ 303.551589] dump_stack+0x244/0x39d [ 303.551617] ? dump_stack_print_info.cold.1+0x20/0x20 [ 303.551652] should_fail.cold.4+0xa/0x17 [ 303.551678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.551697] ? print_usage_bug+0xc0/0xc0 [ 303.551715] ? autoremove_wake_function+0x370/0x370 [ 303.551733] ? zap_class+0x640/0x640 [ 303.551750] ? remove_wait_queue+0x360/0x360 [ 303.551769] ? print_usage_bug+0xc0/0xc0 [ 303.551795] ? __lock_acquire+0x62f/0x4c20 [ 303.551819] ? __lock_acquire+0x62f/0x4c20 [ 303.576636] ? __wait_on_bit+0x92/0x130 [ 303.590804] ? print_usage_bug+0xc0/0xc0 [ 303.590833] ? mark_held_locks+0x130/0x130 [ 303.590851] ? mark_held_locks+0x130/0x130 [ 303.590886] __should_failslab+0x124/0x180 [ 303.599002] ? mempool_free+0x370/0x370 [ 303.599022] should_failslab+0x9/0x14 [ 303.599038] kmem_cache_alloc+0x47/0x730 [ 303.599071] ? mempool_free+0x370/0x370 [ 303.599091] mempool_alloc_slab+0x44/0x60 [ 303.652227] mempool_alloc+0x193/0x4a0 [ 303.656136] ? mempool_destroy+0x30/0x30 [ 303.660225] ? find_held_lock+0x36/0x1c0 [ 303.664307] bio_alloc_bioset+0x3a2/0x6f0 [ 303.668474] ? bvec_alloc+0x2d0/0x2d0 [ 303.672297] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.677760] ? kasan_check_read+0x11/0x20 [ 303.681922] submit_bh_wbc+0x133/0x7c0 [ 303.685815] ? __might_sleep+0x95/0x190 [ 303.689808] write_dirty_buffer+0xb5/0x150 [ 303.694069] fsync_buffers_list+0x401/0xce0 [ 303.698405] ? zap_class+0x640/0x640 [ 303.702142] ? write_dirty_buffer+0x150/0x150 [ 303.706667] ? _atomic_dec_and_lock+0x22a/0x360 [ 303.711350] ? _atomic_dec_and_lock_irqsave+0x3e0/0x3e0 [ 303.716727] ? dput.part.25+0x241/0x860 [ 303.720713] ? lock_downgrade+0x900/0x900 [ 303.724887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.730436] ? iput+0x679/0xa90 [ 303.733728] ? inode_add_lru+0x2a0/0x2a0 [ 303.737811] sync_mapping_buffers+0x113/0x190 [ 303.742312] ? shrink_dcache_sb+0x350/0x350 [ 303.746641] ? fsync_buffers_list+0xce0/0xce0 [ 303.751165] ext4_sync_file+0xfb4/0x1500 [ 303.755242] ? ext4_getfsmap+0xd70/0xd70 [ 303.759339] ? fget_raw+0x20/0x20 [ 303.762800] ? __sb_end_write+0xd9/0x110 [ 303.766876] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.772423] ? fput+0x130/0x1a0 [ 303.775720] ? do_syscall_64+0x9a/0x820 [ 303.779713] ? do_syscall_64+0x9a/0x820 [ 303.783700] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 303.788299] ? ext4_getfsmap+0xd70/0xd70 [ 303.792374] vfs_fsync_range+0x140/0x220 [ 303.796456] do_fsync+0x52/0xa0 [ 303.799746] __x64_sys_fsync+0x33/0x40 [ 303.803644] do_syscall_64+0x1b9/0x820 [ 303.807549] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.812938] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.817874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.822756] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.827781] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.832808] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.837842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.842715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.847909] RIP: 0033:0x457569 [ 303.851111] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.870032] RSP: 002b:00007f0ac9678c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004a [ 303.877749] RAX: ffffffffffffffda RBX: 00007f0ac9678c90 RCX: 0000000000457569 [ 303.885021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 17:48:27 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x80) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0xffffffffffffff6c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigpending(&(0x7f0000000080), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000140)=""/91, 0xffffffffffffff23) 17:48:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 303.892297] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.899578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ac96796d4 [ 303.906859] R13: 00000000004bde4b R14: 00000000004cccd0 R15: 0000000000000004 17:48:27 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:27 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fff, 0x4003) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xad00000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:27 executing program 1 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:27 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:27 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 304.331065] FAULT_INJECTION: forcing a failure. [ 304.331065] name failslab, interval 1, probability 0, space 0, times 0 [ 304.377518] CPU: 0 PID: 10305 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 304.386072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.395429] Call Trace: [ 304.395470] dump_stack+0x244/0x39d [ 304.395509] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.395564] should_fail.cold.4+0xa/0x17 [ 304.395591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.395627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.395675] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.427203] ? find_held_lock+0x36/0x1c0 [ 304.431306] ? __might_sleep+0x95/0x190 [ 304.435801] __should_failslab+0x124/0x180 [ 304.440081] ? mempool_free+0x370/0x370 [ 304.444091] should_failslab+0x9/0x14 [ 304.447898] kmem_cache_alloc+0x47/0x730 [ 304.451975] ? mark_held_locks+0x130/0x130 [ 304.456231] ? mempool_free+0x370/0x370 [ 304.460296] mempool_alloc_slab+0x44/0x60 [ 304.464445] mempool_alloc+0x193/0x4a0 [ 304.468332] ? preempt_notifier_register+0x200/0x200 [ 304.473438] ? __switch_to_asm+0x34/0x70 [ 304.477520] ? mempool_destroy+0x30/0x30 [ 304.481629] ? pagevec_lookup_range_tag+0x40/0x80 [ 304.486483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.492102] ? __filemap_fdatawait_range+0x58a/0x8b0 [ 304.497307] ? svc_rdma_sendto+0x2440/0x268c [ 304.501735] bio_alloc_bioset+0x3a2/0x6f0 [ 304.505893] ? bvec_alloc+0x2d0/0x2d0 [ 304.509707] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.515158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.520708] ? __ext4_get_inode_loc+0x470/0x1330 [ 304.525476] submit_bh_wbc+0x133/0x7c0 [ 304.529366] ? __might_sleep+0x95/0x190 [ 304.533366] __sync_dirty_buffer+0x1a6/0x3d0 [ 304.537778] ? sync_mapping_buffers+0x190/0x190 [ 304.542480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.548035] ? check_preemption_disabled+0x48/0x280 [ 304.553060] sync_dirty_buffer+0x1a/0x20 [ 304.557123] ext4_write_inode+0x417/0x4d0 [ 304.561287] ? ext4_iget_normal+0xe0/0xe0 [ 304.565625] __writeback_single_inode+0xf4a/0x1650 [ 304.570599] ? __mark_inode_dirty+0x1500/0x1500 [ 304.575270] ? zap_class+0x640/0x640 [ 304.578986] ? fsync_buffers_list+0x903/0xce0 [ 304.583483] ? lock_downgrade+0x900/0x900 [ 304.587639] ? find_held_lock+0x36/0x1c0 [ 304.591727] ? wbc_attach_and_unlock_inode+0x5c0/0xa30 [ 304.597024] ? lock_downgrade+0x900/0x900 [ 304.601188] ? lock_downgrade+0x900/0x900 [ 304.605358] ? check_preemption_disabled+0x48/0x280 [ 304.610381] ? kasan_check_read+0x11/0x20 [ 304.614555] ? do_raw_spin_unlock+0xa7/0x330 [ 304.618967] ? do_raw_spin_trylock+0x270/0x270 [ 304.623567] ? __lock_is_held+0xb5/0x140 [ 304.627644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.633197] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 304.638492] ? __writeback_single_inode+0x1650/0x1650 [ 304.643714] ? _atomic_dec_and_lock_irqsave+0x3e0/0x3e0 [ 304.649085] writeback_single_inode+0x3c2/0x590 [ 304.653770] ? wb_writeback+0xfb0/0xfb0 [ 304.657752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.663291] ? iput+0x679/0xa90 [ 304.666584] sync_inode_metadata+0x120/0x190 [ 304.670996] ? sync_inode+0x30/0x30 [ 304.674649] ext4_sync_file+0xfde/0x1500 [ 304.678719] ? ext4_getfsmap+0xd70/0xd70 [ 304.682805] ? fget_raw+0x20/0x20 [ 304.686274] ? __sb_end_write+0xd9/0x110 [ 304.690338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.695874] ? fput+0x130/0x1a0 [ 304.699158] ? do_syscall_64+0x9a/0x820 [ 304.703134] ? do_syscall_64+0x9a/0x820 [ 304.707139] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 304.711769] ? ext4_getfsmap+0xd70/0xd70 [ 304.715835] vfs_fsync_range+0x140/0x220 [ 304.719906] do_fsync+0x52/0xa0 [ 304.723187] __x64_sys_fsync+0x33/0x40 [ 304.727115] do_syscall_64+0x1b9/0x820 [ 304.731000] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.736397] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.741328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.746174] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.751209] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 304.756267] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.761291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.766145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.771333] RIP: 0033:0x457569 [ 304.774571] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.793491] RSP: 002b:00007f0ac9678c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004a [ 304.801227] RAX: ffffffffffffffda RBX: 00007f0ac9678c90 RCX: 0000000000457569 [ 304.808528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 304.815809] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 17:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x628, 0x0) r3 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x20010, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000080)=[@release={0x40046306, 0x2}, @increfs={0x40046304, 0x3}, @exit_looper, @decrefs={0x40046307, 0x2}], 0x56, 0x0, &(0x7f0000000140)="ab5d81c602beaed30a5993e4ba25ade30c5c97a5b4fed26ff3b941f305985208197907144fe71abfe3cf5537527712b9a8573fac388f2e5176b35fac6c9f167357dc93ac56e770cd60b4fcb013cae890a38f7c64637f"}) r4 = timerfd_create(0x0, 0x0) readv(r4, &(0x7f0000000380)=[{&(0x7f0000000100)=""/120, 0x78}], 0x1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) timerfd_settime(r4, 0x3, &(0x7f0000000040)={{0x77359400}}, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000780)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={r3}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xa769, 0x1, 0x3, 0xb807, 0x3, 0x3, 0x1a, 0x87, 0x40, 0xb5, 0x8, 0x3767, 0x38, 0x1, 0x400, 0x8, 0x7ff}, [{0x2, 0x8, 0x1, 0x8, 0x9, 0x9, 0x7ff, 0x1}], "00be500b8162e5f5e557c203af606601ac71ee8e3028e099a73476efcc8f107b013500c52d8ca55bcf0d36260a3323de9838e6", [[], [], []]}, 0x3ab) 17:48:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000a0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 304.823083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ac96796d4 [ 304.830366] R13: 00000000004bde4b R14: 00000000004cccd0 R15: 0000000000000004 17:48:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:30 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1) 17:48:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x105000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) syz_open_dev$audion(&(0x7f00000011c0)='/dev/audio#\x00', 0x7, 0x400) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002200)=0x0) r3 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r2, r3, 0x20, &(0x7f0000002240)={0x9, 0x5, 0x1, 0xd0}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'veth1_to_team\x00', 0x200}) r5 = semget$private(0x0, 0x3, 0x2) semctl$GETNCNT(r5, 0x1, 0xe, &(0x7f0000001200)=""/4096) write(r0, &(0x7f0000000140)="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", 0x1000) fcntl$setpipe(r0, 0x407, 0x2000000000) read(r1, &(0x7f0000367fe4)=""/91, 0xfffffdf9) fsetxattr$security_selinux(r4, &(0x7f0000001140)='security.selinux\x00', &(0x7f0000001180)='system_u:object_r:checkpolicy_exec_t:s0\x00', 0x28, 0x1) 17:48:30 executing program 3: mmap(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x1000004, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x81, 0x101100) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000000c0)=0xbb) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x400445a0, &(0x7f0000013000)) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)}) close(r0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0xd3dc}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={r3, 0xc0, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x8, @loopback, 0x1}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e24, @rand_addr=0x6}, @in6={0xa, 0x4e20, 0x8, @loopback, 0xe3e}, @in6={0xa, 0x4e24, 0x100000001, @remote, 0x100000000}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0xfffffffffffffffd}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff8}]}, &(0x7f0000000280)=0x10) 17:48:30 executing program 1 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 305.074485] EXT4-fs: 5 callbacks suppressed [ 305.074500] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:30 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0xa0080, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000240)=""/106) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_delete(r1) read(0xffffffffffffffff, &(0x7f0000367fe4)=""/91, 0x275) timer_create(0x0, &(0x7f0000000140)={0x0, 0xa, 0x2, @thr={&(0x7f0000000080)="a503c77dac9cdfb6430002355fb17c8225d7f809968a5caa157fc2aa455bd1c208e67c384063b0b4b5d39128b511007893e39b24bc966bcea617fc32f9aa0150844c4dc8b508014831807815", &(0x7f0000000100)="d2a4d68b7c45a7b904832d5b414ad41fe00f"}}, &(0x7f0000000180)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x200000, 0x0) 17:48:30 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ac"], 0x1) [ 305.139955] FAULT_INJECTION: forcing a failure. [ 305.139955] name failslab, interval 1, probability 0, space 0, times 0 [ 305.187796] CPU: 0 PID: 10346 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 305.196367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.205740] Call Trace: [ 305.208354] dump_stack+0x244/0x39d [ 305.212010] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.217225] ? trace_hardirqs_on+0xbd/0x310 [ 305.221592] ? kasan_check_read+0x11/0x20 [ 305.225781] should_fail.cold.4+0xa/0x17 [ 305.229864] ? fault_create_debugfs_attr+0x1f0/0x1f0 17:48:30 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xffff, 0x1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x1f, 0x6, 0x4, 0x2, 0x4, 0x5, 0x1, 0x7, r1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000000)='\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000240)) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) read(r4, &(0x7f0000367fe4)=""/91, 0x275) [ 305.234983] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 305.240112] ? print_usage_bug+0xc0/0xc0 [ 305.244198] ? autoremove_wake_function+0x370/0x370 [ 305.249240] ? remove_wait_queue+0x360/0x360 [ 305.253671] ? __lock_acquire+0x62f/0x4c20 [ 305.257937] ? mark_held_locks+0x130/0x130 [ 305.262194] ? __lock_acquire+0x62f/0x4c20 [ 305.266462] __should_failslab+0x124/0x180 [ 305.270724] ? mempool_free+0x370/0x370 [ 305.274715] should_failslab+0x9/0x14 [ 305.278529] kmem_cache_alloc+0x47/0x730 [ 305.282708] ? kasan_check_write+0x14/0x20 [ 305.286949] ? __brelse+0x104/0x180 [ 305.290604] ? mempool_free+0x370/0x370 [ 305.294592] mempool_alloc_slab+0x44/0x60 [ 305.298748] mempool_alloc+0x193/0x4a0 [ 305.298773] ? mempool_destroy+0x30/0x30 [ 305.298787] ? zap_class+0x640/0x640 [ 305.298814] ? find_held_lock+0x36/0x1c0 [ 305.298840] bio_alloc_bioset+0x3a2/0x6f0 [ 305.298862] ? bvec_alloc+0x2d0/0x2d0 [ 305.322521] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.328010] ? kasan_check_read+0x11/0x20 [ 305.328117] kauditd_printk_skb: 16 callbacks suppressed 17:48:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3e, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000080)=0x637d4d23950d2f87) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000000c0)=r3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0xd, 0x30, r0, 0x0) fcntl$setlease(r2, 0x400, 0x2) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180)=0x200, 0x4) read(r4, &(0x7f0000367fe4)=""/91, 0x275) accept$unix(r2, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) [ 305.328139] audit: type=1804 audit(1539712110.405:138): pid=10360 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/121/file0" dev="sda1" ino=16568 res=1 [ 305.332205] submit_bh_wbc+0x133/0x7c0 [ 305.332221] ? __might_sleep+0x95/0x190 [ 305.332241] write_dirty_buffer+0xb5/0x150 [ 305.373538] fsync_buffers_list+0x401/0xce0 [ 305.377897] ? zap_class+0x640/0x640 [ 305.381632] ? write_dirty_buffer+0x150/0x150 17:48:30 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="17"], 0x1) [ 305.386157] ? _atomic_dec_and_lock+0x22a/0x360 [ 305.390841] ? _atomic_dec_and_lock_irqsave+0x3e0/0x3e0 [ 305.396224] ? dput.part.25+0x241/0x860 [ 305.396244] ? lock_downgrade+0x900/0x900 [ 305.396270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.409935] ? iput+0x679/0xa90 [ 305.409957] ? inode_add_lru+0x2a0/0x2a0 [ 305.409982] sync_mapping_buffers+0x113/0x190 [ 305.409997] ? shrink_dcache_sb+0x350/0x350 [ 305.410014] ? fsync_buffers_list+0xce0/0xce0 [ 305.410044] ext4_sync_file+0xfb4/0x1500 [ 305.434710] ? ext4_getfsmap+0xd70/0xd70 [ 305.434738] ? fget_raw+0x20/0x20 [ 305.442248] ? __sb_end_write+0xd9/0x110 [ 305.446323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.451872] ? fput+0x130/0x1a0 [ 305.455169] ? do_syscall_64+0x9a/0x820 [ 305.459187] ? do_syscall_64+0x9a/0x820 [ 305.463185] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 305.467790] ? ext4_getfsmap+0xd70/0xd70 [ 305.471871] vfs_fsync_range+0x140/0x220 [ 305.475954] do_fsync+0x52/0xa0 17:48:30 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 305.478216] audit: type=1804 audit(1539712110.545:139): pid=10369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/122/file0" dev="sda1" ino=16595 res=1 [ 305.479252] __x64_sys_fsync+0x33/0x40 [ 305.479272] do_syscall_64+0x1b9/0x820 [ 305.479292] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.516294] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.522026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.526893] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.531940] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.536977] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.542012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.542042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.552082] RIP: 0033:0x457569 [ 305.552099] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.552107] RSP: 002b:00007f0ac9678c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004a [ 305.552120] RAX: ffffffffffffffda RBX: 00007f0ac9678c90 RCX: 0000000000457569 17:48:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffffa0010000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000000000000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 305.552128] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 305.552136] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.552144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ac96796d4 [ 305.552153] R13: 00000000004bde4b R14: 00000000004cccd0 R15: 0000000000000004 [ 305.646235] audit: type=1804 audit(1539712110.555:140): pid=10370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/122/file0" dev="sda1" ino=16595 res=1 [ 305.733106] audit: type=1804 audit(1539712110.785:141): pid=10383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/123/file0" dev="sda1" ino=16562 res=1 [ 305.771149] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x1653, 0x4000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@remote, 0x5, 0x0, 0x3, 0x1, 0x4, 0x0, 0x1000}, &(0x7f0000000340)=0x20) sendmmsg(r0, &(0x7f0000000080), 0x0, 0x4000) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x4, @local, 'veth1_to_team\x00'}}) r3 = gettid() sched_getaffinity(r3, 0x8, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 17:48:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:30 executing program 1 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8, 0x1cc00) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0xa802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x100) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r5, &(0x7f0000367fe4)=""/91, 0x275) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000002c0)=0x0) fstat(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() sendmsg$unix(r3, &(0x7f00000004c0)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000200)="4d8dcee02527352f8961b8aaabc4a5a5ead4860c4e97154af60999d5a8e012824673b1a50a8b23cc6f2615cca067d105030795fbf00d8867b5bb46f2bf629bbe54c9200d8358e489b4f32a", 0x4b}], 0x1, &(0x7f0000000380)=[@rights={0x20, 0x1, 0x1, [r3, r0, r1]}, @rights={0x18, 0x1, 0x1, [r5]}, @rights={0x18, 0x1, 0x1, [r5]}, @rights={0x30, 0x1, 0x1, [r1, r0, r3, r2, r0, r1, r2]}, @rights={0x30, 0x1, 0x1, [r3, r3, r4, r3, r5, r4, r0]}, @rights={0x30, 0x1, 0x1, [r1, r1, r3, 0xffffffffffffff9c, r4, r0, r4, r2]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x18, 0x1, 0x1, [r3]}], 0x118}, 0x4000014) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r9, 0x84, 0x20, &(0x7f0000000040)=0x2493e6db, 0x4) 17:48:30 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4"], 0x1) [ 305.784933] audit: type=1804 audit(1539712110.795:142): pid=10385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/123/file0" dev="sda1" ino=16562 res=1 17:48:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffffa0008000, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 305.908411] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 305.957399] audit: type=1804 audit(1539712110.975:143): pid=10402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/124/file0" dev="sda1" ino=16712 res=1 17:48:31 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000002e80)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000002ec0)={0x0, 0x200}, &(0x7f0000002f00)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000002f40)=@assoc_value={r1, 0xb65}, &(0x7f0000002f80)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x80000001, 0x0, 0x8, 0x1ff, 0x0, 0x5, 0x0, 0x0, 0x5, 0x1, 0x9, 0x7, 0x1, 0x100000000, 0x9, 0x8000, 0x2, 0x2, 0x1, 0x20000000, 0xfffffffffffffffb, 0xffff, 0x4, 0x80000001, 0x3, 0x7, 0xfffffffffffffff7, 0x9af, 0x80, 0x1f, 0x80000001, 0x7, 0x0, 0x3, 0xfffffffffffffffc, 0x80000001, 0x0, 0x42, 0x1, @perf_config_ext={0xffffffffffff0000, 0x4}, 0x6010, 0x8, 0x1, 0x5, 0x8, 0x1, 0x9}, r4, 0xa, r3, 0xa) read(r3, &(0x7f0000367fe4)=""/91, 0x275) read(r3, &(0x7f0000000140)=""/216, 0xd8) 17:48:31 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 306.109065] audit: type=1804 audit(1539712110.975:144): pid=10409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/124/file0" dev="sda1" ino=16712 res=1 17:48:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7b, 0x301000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000000180)=0x100000001, 0x404, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xfff, &(0x7f000041e000/0x1000)=nil, 0x2) fgetxattr(r2, &(0x7f0000000280)=@known='com.apple.FinderInfo\x00', &(0x7f00000002c0)=""/58, 0x3a) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000001c0)=""/141) 17:48:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xad000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/131, 0x83}, {&(0x7f00000001c0)=""/225, 0xe1}, {&(0x7f00000002c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/67, 0x43}, {&(0x7f00000003c0)=""/200, 0xc8}], 0x5, &(0x7f0000000540)=""/49, 0x31, 0x770}, 0x1) fsync(r0) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/5) 17:48:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 306.173458] audit: type=1804 audit(1539712111.225:145): pid=10423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/125/file0" dev="sda1" ino=16689 res=1 17:48:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040)=0x6, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:31 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 306.270014] audit: type=1804 audit(1539712111.225:146): pid=10426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/125/file0" dev="sda1" ino=16689 res=1 17:48:31 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000140), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) lstat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) r1 = socket$inet(0x2, 0x5, 0x2) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x4, 0x10001, 0x4, 0xff, 0x6, 0x10000, 0x2, 0x8, 0x80000000000000, 0xfffffffffffffe90, 0x1b}, 0xb) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)={0x1, 0x5604, 0x0, 0x3, 0x9, 0x80000001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x494000, 0x0) 17:48:31 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x6a) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 306.367699] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:31 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f"], 0x1) [ 306.423591] audit: type=1804 audit(1539712111.435:147): pid=10447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/126/file0" dev="sda1" ino=16568 res=1 17:48:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x28100) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x0, 0xffffffff}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000080)={r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r3, &(0x7f0000367fe4)=""/91, 0x275) 17:48:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 306.486987] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:31 executing program 1: io_setup(0x41000000000003, &(0x7f0000000100)=0x0) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0xfffffffffffffffd) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000040)={0x2, 0x5d7}, 0x2) fsync(r2) 17:48:31 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x7) r2 = accept4(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7f, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f00000002c0)=@ethtool_dump={0x4e, 0x0, 0x0, 0x80000}}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000240)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x1, 0x4}, 0xb) write$vnet(r2, &(0x7f00000004c0)={0x1, {&(0x7f0000000340)=""/109, 0x6d, &(0x7f00000003c0)=""/215, 0x3, 0x3}}, 0x68) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000001c0)=""/8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000540)={0x6759d9e4, 0x1, 0x6, 0x8000000, 0x8001, 0xfffffffffffffffe}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000004300)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f00000027c0), 0x1, &(0x7f0000000080)=""/210, 0xfffffd94}}], 0x684, 0x0, &(0x7f0000004480)={0x0, r4+30000000}) 17:48:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10001, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000180)=ANY=[@ANYBLOB="6d060000010000d1c75df22668bbe7004900000000000000"]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x28d1bb77268a7a00, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x100) flock(r0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x79c) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xffff, 0x10000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfbfffffffffffffc, 0x0, 0x0, 0x0, 0x755, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffbfff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x86b, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000367fe4)=""/91, 0x275) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x4, 0xfff, 0x6, 0x200}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={r5, 0x45, "b2cc1d3758a3a575a3d0c24e1cf54fbb6515933a1c687072a7fec69c8dc00b27f160ffaef650335dbbcc6e06f619f4f289d67c7554944988bc0e7fb6047e812548e41dbb59"}, &(0x7f00000002c0)=0x4d) 17:48:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x300, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:31 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}}, [0x1, 0x1, 0x3, 0x1, 0x8b4, 0x2, 0x3, 0xfffffffffffff801, 0x0, 0x8, 0x2, 0x7, 0xb7b, 0x4, 0xffffffffffff8001]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e22, 0x3ff, @mcast1, 0x1ff}}, 0x2, 0x7f, 0x101, 0xffffffffffffff81, 0x55}, 0x98) [ 306.793323] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x4, 0x4) fcntl$setstatus(r0, 0x4, 0x4000) fsync(r0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, 0x80000003, {0x4, 0x4, 0x7fffffff, 0xffffffffffff924a}}, 0x20) write$vnet(r0, &(0x7f0000000280)={0x1, {&(0x7f0000000080)=""/141, 0x8d, &(0x7f00000001c0)=""/147, 0x3}}, 0x68) 17:48:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x500, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 306.924949] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:32 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000001c0)=""/91, 0x23c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r1, 0x0, 0xc, &(0x7f0000000140)='[security]\'\x00'}, 0x30) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x1, 0xe9, 0x7, 0x3, 0x0, 0x0, 0x10401, 0x0, 0xfffffffffffffff9, 0x10001, 0xd, 0x7, 0x1ff, 0x9, 0x80000, 0x401, 0x9, 0x200, 0x0, 0x2, 0x6, 0x7fff, 0x7fffffff, 0x3, 0x2, 0xbce, 0x7, 0x1, 0x2, 0x9, 0x10000, 0x2, 0x6, 0x3, 0x2, 0x3, 0x0, 0x1, 0x6, @perf_config_ext={0x800, 0x401}, 0x4000, 0x8, 0x1, 0x2, 0x5, 0x9, 0x200000000000000}, r2, 0xa, r1, 0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) faccessat(r3, &(0x7f0000000040)='./file0\x00', 0x8, 0x300) 17:48:32 executing program 3: io_setup(0x41000000000003, &(0x7f0000000100)=0x0) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0xfffffffffffffffd) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000040)={0x2, 0x5d7}, 0x2) fsync(r2) 17:48:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2`', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:32 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x40) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x18c) readahead(r0, 0x0, 0x2) fsync(r0) 17:48:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:32 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:32 executing program 3: r0 = socket(0x10, 0x3, 0x100000) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001900010200000000000000001d0100002c000200217b266c6f6c6f2e2c47504c276370757365746e6f64657621285d76626f786e65743123bf5e5b00b9ca8c"], 0x40}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/223, &(0x7f00000001c0)=0xdf) 17:48:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000000)=""/91, 0x5b) 17:48:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x54) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) fsync(r0) [ 307.227972] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:32 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="c0"], 0x1) 17:48:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xb58, 0x400440) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x9, 0xc83, 0x6, 0xc4f, 0xd15, 0xfffffffffffffff7, 0x4, 0x0, 0xa60f, 0x9, 0x0, 0x5}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0xb) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f0000ab9ff0)={0x0, &(0x7f000039a000)}, 0x10) [ 307.322254] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x8, 0x0, 0x7ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) rmdir(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 17:48:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) getresuid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) getgroups(0x6, &(0x7f0000000580)=[0x0, 0x0, 0xee00, 0xee00, 0x0, 0xffffffffffffffff]) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x2000000, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfsdef={'smackfsdef', 0x3d, "2921656d312b65746830377365637572697479736563757269747988"}}, {@audit='audit'}, {@fsname={'fsname', 0x3d, 'keyring'}}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@appraise='appraise'}, {@uid_lt={'uid<', r3}}]}}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) getgroups(0x1, &(0x7f0000000140)=[0x0]) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x1000000, &(0x7f00000002c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf9bd}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x7}}, {@max_read={'max_read', 0x3d, 0x7}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@obj_type={'obj_type', 0x3d, 'lo'}}]}}) fsync(r4) 17:48:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:32 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x80000001) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v1={0x2, "ee280df7bbf61ebd10d47ae858e1cd12a3cc81"}, 0x14, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mlockall(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/91, 0x41c) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x200) mount(&(0x7f00000001c0)=@md0='/dev/md0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='qnx6\x00', 0x2, &(0x7f0000000280)='@eth0.\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000080)=0x7) 17:48:32 executing program 3: mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(r2) close(r0) 17:48:32 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x400) ioctl$TIOCSCTTY(r0, 0x540e, 0x7fff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x6e, 0x4, 0xb6c3, "d1917a54622aedb6739b74bac171a9bb", "3b145889a00d1af250aac5079226e7a2fd76ed6f23d7bf49eba251b7773faa8cee75466d6f3a60aefa24a03688731246b472f65cda262df190d5b4f80213ad885a097ee9bcc166f3af8a56d1a29ae288766ba09e737499136c"}, 0x6e, 0x3) fsync(r1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000005c0)=0xe8) fsetxattr$security_capability(r1, &(0x7f0000000480)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x7, 0x643f}, {0x9, 0x101}], r3}, 0x18, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e23, 0x0, @local}}}, &(0x7f0000000100)=0x84) r5 = semget$private(0x0, 0x4, 0x20c) semctl$IPC_RMID(r5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r4, 0x8}, &(0x7f0000000440)=0x8) sendmmsg(r0, &(0x7f0000004840)=[{{&(0x7f0000000680)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80, &(0x7f0000002800)=[{&(0x7f0000000700)="fa0418accef21601258d30fb9e370a903d8d9974f18d0d9199696a76ad9e7dee0d2ceb9222379549cd676df4cfc6c68e9f7b93d81d04b2f4f5ec7cdcbcf7680a6b17d503771b55d54db40b1c067a7b3c7836f18bb8b9361231dcfff7e504dccfe1a7351685aa4c8404f955e5bd66762266a0db3f843b4b4001865489e7cc0f78dc3a26b83b62041925180e2676f1a7518a37db3b13db1c6436e0b317e4dc5ce1f53cfbd7ffa0b7b9e72c49c40020febd1d8d925e7559c4dc74e54d83922ea2e5651c7b4824f28ae5a9f95a2fbacdde383e32dfdfb1d6be", 0xd7}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="92e7b0819cf78b452766507f88380ba4ea5abf194b566a8c8adc308b46bc147b3b2de0381bdb28d99dfd275af0827fa1913eb23594e91c3592cb46a11698ffc3fc501f378055f7c6bcc7dc5c99242e6fa9418f08fd60cd5e6352e04ecd7238a7fea974198aa94ab628402312b2f3326de7c27208229a81925904bfdaff34d77ef42d7ca38353c75554f6b3e86ebe95b8aa89ff4f95fc5765bc29bfa35a5a96044422dc5ae4c5ce2873cf189f9eff1ad1d7122e3b93d0c9e8b44b833d825540c2b1e708ce41598999d0ac4533e10378997767a9c5ad418aad80cc423429a070931d11e5002e6fdaff5f7f451fea260e9d48dc7d66d6c187b972d5d773ec0f9d5ad1eab7ff2a1398e58039dfcbb107866d9d44df883ee68927cf561659c5d7fe6b47ec651eba790527e5e1b4c17835fee670e18547eeeeb529f299ae23c0ad0d19890ef4b82c03f778ef72adddcaf428b2e3e864fcf4c9c792c386240bdc65e6e9e4f3df47294daea7293d644d7c700c9dd9c6ffa6ebdb05e247a7d710d6e4fd36534799bbb398e54a4a3d1d10fccaa828bdaabb667eddfcc4e13f8d04e8b812c1768dac99725a57d34090c6cada17ea474cc4e6d0d1c7ef941c1b05dc037d88bbe46943bf38790e4717c9ffa372360e31f14856327a9b625358f4d24a7e07372a0386d5680632169e553f21c64b2ea6c6ccb5e52bf73a51017d20d61b605c7e1ec450bf3814726c41582b1bf5b70e031a8e5479c283d440e208e6b2784df5d3772752ed3ca8ba1f88b601c9db37bafcdf998f33438aa799b816c16b40f72233c024e23213ca0c1b75d1dd5827ad00c8a0888c1804891f740fd2589db917169fba9a936900f47f0feff81306ac44e709d143a30c2b9e94da388359c9aa0a91eb48cbbafe1a8213b5a3e06f01c79255858f75067c2da5cfcd771690df34a8fc8da579dce13bbb76a3b98cbe9c26291628bc030695aafa3fb9bb2521de933c13bee8f0c0de707a1b7e17d53f2db7cf35eb6f7d57716559b90c674cd7a4fed84ab4035f6debd98541f1b74a0cdc400913c0e2b302d66a655e97d2c814e27c21e233ebe9a80fc9f0c663c5d195c0741a7a2e5631f38c5309de5b208ddc689d4af7d1b4019623ba1b0c6e108f4d1a947bc58e4adfd0189a7d33679f54f936f27ba74d19f17f9062b264a7f9385ce1566706bf7b9ca14809d452c68d4aa95145364b5b9a8a408b42172105f549b2234fc09e833cff791ca7e77ea7de450f6dcb84425351bea8c1c6a4a3bbbf1a371b41e008775b295001ec09373ca73c8e92c274a06f0f9d6abea8319c47bdeac46da928d1af718dddd9d5058209663fb0ca798c0f000cafe24ebff8a9e7e2f88a6e5b0449b198aff067c94c7ffdc5beac4f049bcd6c3eb6171325fd3e0456a569e7a0c9807272ad1bd36ab68206d2f6d711c5f91bd5376f5f9c48c5bc31d8638edfbd940c2a7fb0cf79e191df5b7fe0d672c3f2a33513c074b2c4cd172673ea8c7fdbd35929c2fd57c89d567e60c7046298999cb2f091d0b4391fcc93d1bdde76c08221226e1aced6aa889c046625190e7741b3e52584cc5cda5d7c40931fb8669e08543a65e9ee03020f1757040ddcfc2a71449316ab8fecb5c56206065de00feba5868022ece1f1ec4c6e3e5cd1818678126314c99c3e5c63ccf924ad0e8595b640c33d40f89bb66e47c8a5ac1a15887d85c0c88c4904f6decd551471017a465d0e6096e144b0bb0dec53d2e26a3bc23578edef917c52ad0ae9dd0123dd35c073e25a215ce1453245b8f5cbb61ae6859d909c5625eb4e8f568ee05a3b929192fe3adc22d7d83d050a96887e7857f942211cd053f51a408f40f4fc0ff730be0e8d42f8dd13b36a31da0c7ed97f724a8e8b5826885d882fe9314edf4735abd3e1a3a1ad5c94a394a71f9f7d646699d1c1f3e164540d57c3dea09a4effc938bbd98392bbe13c567758b0e33bd76120fb2103e9ff25ef677f11be1e1c8668935af691a637d3def67ca78633f8c9a55a571602674cd39a146c71539fb11537952e62dcdf18238f653e8765381ebfb1f8b7d6daed8c1ed7cb3827f98569cd9bf6cc39d73d2444058bc3219ec54cfcf2b711e812e151b4e79fed7181b2900e92fca257031580644bbbcd539a14211aa95f6cc783e883c930fa4b03db76553d88a1de542fc6624bc7b2c928655b11e9c17b425b0b8b4adc2e87bb8cc403406f6070e1689d256582eba40aa7588c74f9d5b6dd0e13290f641ccaca7d57d84b822f24db322f54d899fb0aa30353e8d1e51a2b83e4a79cbc8293040331efe45cae3dc928b17f87ee8fd3bd273cbf317aaa7faa0e2d9c7535f1f4fccb291d7dfb614a4bad7bfdd74328e8ecbf48af149c7c4d6df6f2902d582765afabb6c653c7ca8784d117982389baed69ea16f9f0a3183a51a3a5a48fc43ea85bc218e4e179b2de6a5e56de2e27f107c5ce3b3611dd6ddb77f2f7aa1bd03bf0947779e600cc525ad3c7fc8d986174a0c991d9bef0f0ede013821a69672a49018918311f9338ce282ff522084625c3c2ccb1ba4ba41b01579e295bd9ef8eee95cca9a7f6ba7082eb3cc1a06a6c212b21de42c87817d522da9c3317e08a15f7ff3d511591368e97d60a7751f16d4a6c4661fd0f364ca4029d16aa79c3cbabfe854a9afa9134430c78abbe811e83be945bd1090dc77762d405370b4acd50dae3a9144c6831bc4071da3eb99c6f955348a55e2da5359b567bd495d938d32360a0b117d6f0968e5cd128204e99933d89edcbf956ca5643b72d635846c4f9fd779712b0478ab148f06d50f52a2737607101941fb472fc20b9dad3da8b6240dd54165987d68d5a52974601356e839de2eeaf316c3bfeacdeca71adb1eac963da6bfc880d3ae5786f0528820e765ffa828bbaaf3f117d693e53eac6e005cf0f9464fc8ffaf3aa40b472b7f824d70098fe33947958ed476d42b6623afc24d481bc2009ca0e50c47b0926681e7df3372d61ef60b2cc90ec29b25038f742d2fa3974377b679265d8868b892da37b6ad940251772b14e72ff56a21e0488bb07ca0d6860ed1b165dcd1107e7c345e79fa97033d2c587b4bca5f4a5b51627b84cccc67efa701370dc857d801e86a0b0c7088dacbc5cab541b2ad9677376fdab04f63550c01cf2ce2a45afb2f2f5f68b0ac54be78c4b553aed07bc2bf26f185f23c79d6d5265fd5f49d1f0f88104258055893a83063c0318cf85a2f6cfe4b3f727feb1f60a535edd23025173a851f67ec983eced945965722334d51c87407926b41aefbfc033157258f55fe2f132542537e4fe37866cc25d362abb1d224d2eeb1b821c69392328f0d1d4483994103601f9b26ce330c1d25ce70eb46bf6067ba1985d9f57aaf0eacafdb07f62817967ec65db405f38f947184cb07da18de0cbccd644c8cf13ac3f5af668b9c62509414a5b72372e9381cb5ddfd5e5e62ac16078fe7f34852ad103d9ca4ddc833c8c219f093e3910eb40d2108012d12282bb9c4a298ad438aa41a6464fac5e1c74ec21bc2c2379f4e41bedfbdcf2bd1287f82c02d5d71526cb365fa2a21ec3fd9ccdadd2fb925cf0b6f7c42b047f6d46735599ffb929ac9b24b754da096514fec8f7050291bb3b3ae3d54db4a7794509a00caa3c42c3806485a70aadfdd47dc58ad836a34deb7a60c05453cae5541519bcc40ce08777c1524ee0f399eb907d536424829c6fb8650b186b9064ef7eb212ab42c220ca5d8cd7dfb8ce0d41607eba947915f20192df2a115a30fb4866efd34c47596dbc7470a55cc7f43bc28c64ef588505a3cd6f42fc638c052da263ab70296006661edc2e58385e8f1b225adf0b4f483e54b02be124e6dd9e93c6f3002cbb33cff49943b2718b52d337e9069d5a4f263607236aafecab5b8f1845a64f7d21fca72987398bdae2ff324ac9edfaa4d6ccdfcbab460be7ec53ea1b4897c47913c485fa9ec1115661c968a1b082008bcd1305600846d568f7d00c6f04e3cd8874c6a209f8c70bfc56d5a378fa572b38fe9798b4018eab0dafdbe2f8b4b9ff7034a237596aea59ccc6bdb49c9bd54d971de2456269c1fbc78e51f8c31f8d874c38171caa9b20ae6f5f7648b36641f15b63a2c08ba3b74a2131442bf242167d06fa0d9fc90cf051a05e27cc88f1a849e005a06c9051baacf7121f252a657eaa873d87702125e9d97c208b7dd601ea9c40815f6100188abf5f190aba772ad6c6d612caead6b14f828b14d0a79b44465581a5231f34cfdaa2ea6ad36a20e766a82b3b1af20d4beb39c398eab68581ff6d75866247029bbe681f5bad5d1120aed424663645de4bdfcb35b9ef2db468241a000535638f38d8d2fc9733d9e8b381a482476a5d2febdd7e80aa9d165c1c630041749582cf2c72bbef1744d17f6bb769b2302b996e8c17b576440e7d841778b69c3ee27433ebc7db0fc48be8b91b081cc1edb6e2fe8b165c1f7fe22c0229338b4f443d1aad66d75a9244ad2bf02dac4a92680dde034e241bd0c93cf129c7bfdb07de30b1edb5875111f5b1f1b1dd07c106a41181f408130cfad705b810bbe2d10eabc023e0da8af4f2e7b0f06d54b4fd488243802c5da4629e18e818fcd8a9915a4f27bceb69917a93e645ccf0023319a1c8ff90dca93f7fffb15f0e2dac4c5601b040bdbf7d8ee79c509e1759e92c6f97d58dc865deca16a07eebc97f6b00b9236da58af5092c03b1125782f3a86951d634d529fdd2eb495e4f6a6ac2ef51dcf4a97d7180999bc929dc3ab65b026be0213e1bbf0a09b84c9def498f9a6d655c3f7f10f644b497ffa1c92f2ac61cdbf1ca61c4dc13f4fd1d3cd92c2d993c1b94e9d4f317ea45617f54f08b5230e5f6bbff15e647127471d3b168e725254758e4492900c2e092f931caabab34a6e3c62f10aa15891cd80f5418cea94d8c862a9edee8ea74ebb503db9b4bcfc8d79d422f0a26c86bbe0088fa53692f6456ae460f60ea43cf23e3a8c693e344da5a1255af8c68eff1c9dcba31d9bab2cdbd984c131e423590e1965537911ed68a74ab57d393882162e3a9560a0728cd741944866cf0f7368de1f09e2a30ab3963f45631d6cced587c3b458cb81882baf3c739feeaf7fa5409f8d775d5b432b98b5229977d170e9b8bbc6cd25e621492c0375b70e06784851e5ac871d7a84b4c5baf494189c376c4ee422480ccb890f6e493eb37dcf7ffc45315ecc7fab570b215e11ae19edb53322303c7c3e129f106e76e94e538309598b673853061ebf6396790ddb10b1474c36f4ef7477076d9292f4b1e9a636df21e4875e3b31e19a4b7626995a2eb8c95cae8000112235a7e78d2f20b289173474075d1965b1b3e01941f9102f8d8786ec9461d47fe788fcfd56ea11aee5d8ebc19dca7502ecb278aac63abc45952b830c42998f4a34f0e97d7e745577d667f54ac023c6e9e48f1b8183bc9cd41ceef347763ea86523d4218c4353b9de78c25f4aa43e5cdc0209e5d4eaaf6fa52a0b2f68a30b3385674871340e6379e7f982e58cc5b084b546fae002ceca964cb07b6f44debfc25df12559315ccc6af0364f76800baf86e2831df1013e98cfc3c0e10cc28c1250036264920da750433f7d54759c4b3bc9e90edbd63a862e9d97507774c54a2bf2cd1ce513485d4d5f639f08b256b0823e5f7e839a503ef4c271064c431cf323d7301f0f746d1509f85298cc07fadb52e61806713e5d0a8b7e8c727a75a8e53ea42690d842626b966eae642027830aad81779c9243a047c51684afe07a44636b4b6a5469ad0d838ea", 0x1000}], 0x3, &(0x7f0000002840)=[{0xa0, 0x19f, 0x6, "48bf6b02c468f1b1211c6ee90fdda1b932039a46934ce62087f31f47914c73f415e574209ffe99da512b0c43420e71e2e8876cc6096fe8935e9db4928f7213214fbaaf045f555c977c7445302fd1bcfeed822edb9b4f10be8ef60922f886cf524fe43c00842740b49903da238ae6340864d621999bd6ea5802ab2d9e9cb00fe3e3e4811f8ffcf3015023e0bd"}, {0xa0, 0x0, 0xffffffffffffb3af, "351d1680fc675014ad2ca3b1af78308996da830307648985e51e056db660aa5bb26b802304e0f3a2b07df143a95919cd3e3d9c21f7bd3f1002d81ba45403be8eb79617f6fbb7c6e77ea11f87efa24d6a509bebccb8f126ecbc1968d5beeb513342ce8dc2efcd068ba5b0f2bf2abc13b052baac19facfcdbd90015ee0a6f34640ae71e2e85510827921e2450bdcb5f6f5"}, {0x60, 0x11f, 0x2, "6b252486b4d7d19d95c7a2a7121f6169597e806a45e30b0ff5f167ce51f61da2a84614afb73e1271fec0f076506db52ed8922983c432a60a84acc3fd93ca09c1a4c69e0344fad5752a992b929489"}, {0x10, 0x111, 0x4}, {0x88, 0x29, 0x9, "feaaf32d3dcd44886170d1d9e867d44a44590d2f6a56e5207a7764670b0c1c54d591bf8b1a1593179113d38d4baae6542bb6d63b2060e562556b5da5a65f4e0edf010d017bb618b3a4984311e1cf2eaae9f589889263aed008812122ce0b639808c194a63db677ab5091eac1592a2f1a59cd04bd"}, {0x68, 0x19f, 0x0, "5d20a8d36a6b64cc1900a7985824ebce402c51385b0e3016ba7246fe8334f67e7743a6446a9506f6fcbf9fad34d5d06a4756f1bb30a8f55ce019c96b92978239263954bb85945a68311ea04def13b8f3f3109700"}], 0x2a0, 0x4000085}, 0x3}, {{&(0x7f0000002b00)=@ll={0x11, 0x7, r2, 0x1, 0x1b72}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002b80)="2e235f434d22d0962768726dfc1644605e5408c402245b02e804388d4e6bf0cdc749a40b914495892ac3653da0794b9977a9aee446bc3f83b98169befc9672394e4227c6ef4a01e05130e13910d3903095adc04d013223", 0x57}, {&(0x7f0000002c00)="beb0792ecc6fd135d0fbae154880f21d3d183a7ab3b41b6fa7", 0x19}, {&(0x7f0000002c40)="d0ba78606f0d52eafdfa75122b38ab4adab2ecdccbfa045c799100655ff9c377bf6e225bd196bf8f54dcb1b6bece71c04bb17d800a0d31ca3c261d6b345d0f192981582a3e8e2c6f24a3d6f6ec07e47b5a64090c33d376848d664ff7b63bb29c2c87a0a8df8f823645233a6c14f3dd0cddcaef0eb2dc41b3cdaf86b3363602d62e7e06cca1e125d1ab88b494d260c4eb48590e0180598a672f992580", 0x9c}, {&(0x7f0000002d00)="f569e445dea685dffbd734d6aec1bdf2dab68486ad36df98d317b3ca5a13aecd360a338d6fbd3bb3cb13762c0c3309d4561a3e1ca26434dc3174dae98c30f43aeef5f40e8ffe26c1724461097e149598458c3132fe6fa3d1f4a631d7dd41ec4f84a6080b0c33d02fcb8e8741661a8dcc5b53a7f698c05570a8555b9f1c7179478a4be7b36893e4ada8f4bda3e2358ea4ac6d48f7b5be7f67c81075fe80c122677981e057bb3781b9825b26e87696637869e62d3efafd058646f2931e92b0f3383e4d6af1c6746e554b46e2c370a089a61e01f9a1a05078e8a721136467be4d4fec3cf4846254", 0xe6}, {&(0x7f0000002e00)="aa4c26c95a7aa198dc257bc66b4f15faa115d00b868e916ce1a43927cbebec22e969bf5fd4d6027a4fd116647ff375f2b3ca28e746c1bf07d4cfa128b8fad2164bd95c3c0e7eb727b622fe9df7fa1f99d895292b67c6d3adf9d6db6a1dd6720e89a2fd48d07d160a841d5d81fcfa3c06d2a2b6124317", 0x76}, {&(0x7f0000002e80)="75356b8cbe0ec1c16d7b7ce9d331e40ed1cb714ad44a7b650530f04b604a0cdf0c285f57bdebe3e1a49dc6e260c4486b9d1895a1a4b73dd88a6b643036c1c7b00061b56638ae3438", 0x48}, {&(0x7f0000002f00)="7b7038b0fa73fd94d371fb6c3676958feec60048235f8dad084ff0834068a549cb5b3e13f03947bdc078cacedd4747236a6301658c245472370f083c83d3ca23362f0d9a9dba758e6f867b9c9cc7b85a276994ca19344fba5598bf399e780bbc136a09ecd1eab16dfb427079883961769b87722f02f07af6f4022aba16ee363dda23ce9dd1c3dd5404faad9fc5d18c93731054e6a6bceea07e1ccbca228d29fb8c2cb21b0607d85bc3a83ea2a7ae2317c5b6727fefcafb0307dbf6133ba85077d036f27078ce226b4a249226748c", 0xce}, {&(0x7f0000003000)="b6093b189b4189adfd9f5df2921264f920b6644afcae8c9434ef60bdca30cdba1c4eba3d7a2c16bb6216fb", 0x2b}, {&(0x7f0000003040)="80fac87b4ef9e3ff", 0x8}, {&(0x7f0000003080)="2c546510bfecbbcaf5deb806803165023d89f377ddaf1dbb2254f01af74e0379f846dee08417c312e689fba4a1daa16e20bf8c80297cb2", 0x37}], 0xa, 0x0, 0x0, 0x4000}, 0x7}, {{&(0x7f0000003180)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x80, &(0x7f0000003480)=[{&(0x7f0000003200)="7af575ac0f2808d7c2843e4ebe9fd37bf8572f4cc0dbdeb2cdbc0abbb04ba85656c3b025db518db65c4ba9010041a57328a491ca6edca94bce7a56f58a290f0a9155253205647058ecec9be60e14a8300b22835aef94176ddff299af891d9993c0402fa346afca280c670df7eec831c251052e7bf77cceaade638f97398f3dc63f1af6db661c3bddffd1c8d50de2dd", 0x8f}, {&(0x7f00000032c0)="383883cc9778f21bbd7a2accceaf3b2566cc63064278", 0x16}, {&(0x7f0000003300)="014ad127d3d79afb2911f869e99d55f44b97b4", 0x13}, {&(0x7f0000003340)="2e4e8b9067f8eec2e18ca8bfecaf03b08478cb05af7ea28f2467291067c7026018794e0bef5cd9ea7ca66778885a5227143a437f58abf949f7e559b273d6c16f103a3f4ba0d210fb5c51cefc7e4fa302788a481e0b953f4e57142d15bfe8f6da8605379cb05f1f1a7206d517ee5f99909e81719da6206bfda36f136501a732987d17c8da77182d1e989d8d2497c4acc507e495b980000d1fa447c250a2dfc2655bddd8f2afceb5e6ebafac1992096b7d71ae2be5b62952616ddda87f60f833b2cbfb22", 0xc3}, {&(0x7f0000003440)="e59814a06aba082d0f8a1d6efbd514bc01af8b653ce662c9847c4cb6b7554f96b9051c164aa6dce8d5b713802974a2a9ea2626d3d9b7bd", 0x37}], 0x5, &(0x7f0000003500)=[{0xd8, 0x10b, 0x400, "8189243391e69a98b0228e6d7a8a71b85fc928c79ff10d25c8a40c7034a288604ac6cc11fe0fa50d82fa501aa41b4a6184c64297cc542bf5a696544bdc5177df222ec1cfa46fe2937777f53820bb490d98f15d07a983a9ef4b5b9588b62c0731e83813d811d1d409b195f73dff9f8acae7fe785a3d327822dfbe65aceb27202121767056b771900967b290caaf7124e32cce263ea23ab3f4bec158c2925ef30562231ed71994a89db4d0619b72f0a75ff8c2e9602e2d978a7c736d859e0b6fdeea25d420"}], 0xd8, 0x4}, 0x4}, {{&(0x7f0000003600)=@hci={0x1f, r2}, 0x80, &(0x7f00000039c0)=[{&(0x7f0000003680)="ed4b7273518f92d5a700a6a64b6dbc76ac9fcba0673f6fa916e7b7c7d93fcab551341ec1a2e87fa21bcb4e957fd4b2e90721850754bf4f644d88c201b4eb008d3f43607e9b3d8986ded82a90f15f1cff8cf21cb32d1876073764dc0914c57253d6b71c9433ab9a1a31c77d3ced0f7ff2a1d09d0f93ddf185fdf2fa73fa7066b71aad6409fa48f50d8c224eaf9ec9fd25ad1e551898af3a73f08a20dff80e6ee1baa60602524250a0", 0xa8}, {&(0x7f0000003740)="f87b8bb8afa3d181d395f837e066f1b1dbaa3ac38c27013f20617b7229b72c82d2005301a61aa68b08c44a1af85e1fcc454e13ef7b0e79c6be4e575b7afeb09e35309cde6a290e1ed5e092586c9def0c70e117548b9efd7c2ec35876d7c6494509f560538c4d340dc3163051f73084d898551923a3", 0x75}, {&(0x7f00000037c0)="e53371aaed1ac4129d7e03922c232fdd9e229a1c326e17eeccb6b6b94bfea88b400f81ced982bc83981671ecaf19a47f46e164c105d2948f80df8819221ba23cc28f16ee2e1bb88e50abbd", 0x4b}, {&(0x7f0000003840)="aa90d45284c237eecfca8345f9b311e16f951f98b811836c988aaa9689dee1428b65c3d2221094ff99471754ab3a31c7357fa0de65c139839698a2da492913fc04088bc995d91cf4996d1c8ed0d694001bb0a30157c7db4f49842953a073e448700ed812bf831cad611bce2d95dbb7d222d87340d7222bca3228", 0x7a}, {&(0x7f00000038c0)="51ee1b9843adbcc7b199ad77d37ef49648ca92492f404c50e80fde2df8742271e204fdc2e1a8fdea9718127a3d03cb4d23e6eb403a70e634086b8cd8218d69b6b5969308bb", 0x45}, {&(0x7f0000003940)="d1d91bb24e8e11eb883037930dc7c3f6baf5760481edf323bc193a08", 0x1c}, {&(0x7f0000003980)="22403389d230e3de82", 0x9}], 0x7, &(0x7f0000003a40)=[{0xb8, 0x11f, 0x80000001, "02ffbf0515d3806890757300cd986b33bdd127de023c644a57f7e3bb326776eadee81d5f0b2e993f9696161d24a20a01005ba9ee6c2a2a387671aac624e4e9adb9556cf89e5f9fad674d9cffca19993b3763b00be472d65b2b0ec378659e2a4481f2ddc5ce4abc7f99b9588d92ac7a082107cc0f3efb10ba972abb88d6283a71237b4b13b6ea12218c48270b95229a96f00c671f11236f4f09ac45ec9b131dc5398331"}, {0x50, 0x10c, 0x8000, "e343236f134e44954c3d56ccf33e8c7749ffba002c668b581d70a05832c30f5ac70a9b0397d089bae77f2bef56b23e5668ed591b6358e48374630548"}, {0x58, 0x11f, 0x2, "320f670f084f2e01276b69edde1190f4113f5f220dcd7615aceddac92770fe6c22a29630aa368ecdda0496f5f0091b001042e263bea7866bacc29f1c8fc6afb1824630c2"}, {0x20, 0x107, 0x9, "c09093c66960a778c3"}, {0x28, 0x111, 0x80000001, "a95bedebc0f99a9edbaff51b54de1fa4e7fbbdc3fd92"}, {0x40, 0x11f, 0x7fffffff, "319bcca985136565d25c83be56c819d6e4b4cfa94e8dec6ab55b23109dad632cc9295bb87e3ffe1fe04146"}, {0xd0, 0x104, 0x10001, "5c4321ca467b1315f602a68bc1af606379d33284c66065ea8ad7dc2cf799b3d6f7b5f2474d5c530883d14c9c44485c38db1574bae9fc6e97b43e422b4286dcf797d5e74dac1ef95f35800e970c80bad2a7736718fba8497935620a93f8420f6b7a46a9a7d368dd517593e686088c18b682eaf453d9293d72fa8588cf7a9a77defd3fbd2a7deb37ddb0a8acdf4c724d73a532cb5d41bcda75be5f9e2b67f5bdd699a6bf5655adac04a97882ac985b319540c1de17b4af158eaa"}], 0x2b8, 0x40}}, {{&(0x7f0000003d00)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000004180)=[{&(0x7f0000003d80)="1f94bf3c22f971a8d41f07f6d3be8ad60f988167a703816e43dd522f49fcf53907b5263da9d8e5c7ddd50dcd8fd96a0ce258a6e432913811f9c52dcb550452169baf5cf3f51c37fdcfb6c9bdc01afba48eba5bef9bd60e0623f0e2e1abd56340dcfddc70f6eaf890386cae67b7ab41885b6156fc1933d03870912cd28f80a67ed3f253e9023d82a4945cdca2cdf7297467a5a572f24833368f701e51607f0cd3786db72d2fe7ec792ab70fc27498e27241a7912f922bcc15e8e0b3fd0fdae346ee19423323ce5430a3b35b1b4e73b7d742326c4a0b0977e5cb081945074dcbaae51f79637b23195665", 0xe9}, {&(0x7f0000003e80)="cc3001636375485ee5a35b84c17dcd8ee45bfa5d561afd10b3e451486eba0e103fa74a0e2f4f5764240e5e340950a203a1dd7f1a69d501e10e20c629f1cb8e7fdf94670c201e5f822a9498de617bb0bcc2aa2e492b873fa1a2f58eca87432386c0a70dc9b035c75463414768999b5f4fd0257fcd011279b1b7b5acf2baf29a316f9840199c000d7a1e5a17c2ba93252ca6b5cb22c9a169a3b33850d097f129b18becc3c848196d67fef8402930550c3c0546cb5bf82d060a5c7c1f10628609d2", 0xc0}, {&(0x7f0000003f40)="fe1bc6c90a35b3b838166eff6cfb4fad562c2aa300c6476a0e412a6690f5a7afcb939a373b92584f62c8af3416eef6e61fef3ddbb6", 0x35}, {&(0x7f0000003f80)="8178c34b28b182947452b98756b4f0b700dc6ee98f774e1bf6b63c9f86d1df29e3533c18446ce29ab788d30535ed648dfe27ba2d5b84e5d9156b710b32dae36dfd5f704660d93a833e71bf83aee5b89949d68a26c01520554624d4cd7410d55280b6ff57f0b60ebe66e37d92", 0x6c}, {&(0x7f0000004000)="a1a9bc08bc1a1f4c912c5e7071ea4dd5e91b87a092320d5afc8e66827921b43923efcf0d21e32d64d148cec23eb7520322f497c861b40610c2ad7a70869b", 0x3e}, {&(0x7f0000004040)}, {&(0x7f0000004080)="bc7eb6de025e77a50c628335f50fdff912cd5601eb5a16541ca2e06b8242004568b5a78b9812fcf837c0f52d44f1a4c4d6b7183dd809b78327bd349680da9f6dfdf6109b2582bde783397915fce4bfa451010d176a4dc495afcdfef677fbf29614aba8be550de209e6b73ea06ae1b7ec305d2759c05c9e486b32b29df512c40639281e4f2889d0ca072903419430b183d67bce3bbc1b48d8bb163b52c9380579b64daea5e4695dea22fed1ff0effa64c4af2f01784b8bb6c33b3186c5a13fe848d3c4cb06c", 0xc5}], 0x7, &(0x7f0000004200)=[{0x70, 0x0, 0xecea, "c17cb6d496f9ac09f36c2aa433108c756664676388427b6315bb5e8d01789470f2662d45694cebe283704885235f345aed34b9112991c3b6d08eb94c7d26c3a8b2943ff970a3cb9e8fab3f48e3f3d6ceec6c8f05d4578d5d3d35"}, {0x20, 0x109, 0x0, "72551b0ceffe84caf17c"}, {0xe0, 0x13d, 0x3, "c81e89e2d3646d9b2a4e8231b93f2c3acce15748d972637bcb9f0c4a1e07da82fc693c03ddbc71d4ab141b6bf7d98050b7592badd5afed874149327a1cab363c2b972fcfcd1abc230806998153a45ce0e599c472b45aac59238e7e56a8d342fc50a267cf421a3722e541d7ef88ffea6d90dcc1410c0d3af55bf204924250ae4f17c8f91ee767f4e886167aa90fd6aec991259de19b7fc63287e8af7a66a96963b28a7e6d93cae725e7154940dbc4399fe11fa222cddb95c634a2553e9e6c9983c7383b321d9a3d6bc7579867"}, {0xc8, 0x6, 0x3, "f00623062a47458de7262f3d71553def65346ee6b1b90e7b7d2d4a577ea43c1f3072f851c1c5583d0187c6e57ef78d2f91d91131bc5bc63ecffddd8847d467e532db13a88cd2b827c91e264d993858333388b7976d8077cc61081febb210c79cf0b9690b6c0a49afe87e45266e716885de6770aefe7dc9faf74ba33a22a7cbf450d7a3a7417faf7e37630132e7a7dbdc021f4108f08d75cea4c6d910fc4a26254ffc41099d8078596ab6d79ded031a0168ab83608da4a288"}, {0xd0, 0x10f, 0x3, "3e4088319f0df4d99eb7c79fee9d2401439fafe219ff382352fd28d148e5e7484eda6b86ead410b9a6869701fae7bbc299b26b1d100484eb9f321b1ef80dda71ed41d13df24795d523796cbcf89d23f44f805350d47182e2b255c99cd26ff3347190388cd758f738ad1197a03dba0eb03ac172cf4b09dd2be71cc693235a4d1e7c0f5eb629056e980f98c71a0d19309d56b6745d6f308d0e271fa018bd6cc50dd50a96a396c3fff96bd103c3db60871739ae6d4836a3db55c7278988"}, {0xd8, 0x3a, 0x5, "c3047b2f62ec02f1297338eeab712fe3892f814e407debe0153aac7ca826c3424c0028e39623a75625087751dabb6d30c99bd8caeeefedcc9307c14ebe91404cb80eb564039440c489306d609b206dcb647fa8344a10ea2d6df4ccd5859b008481cf7b3d89200e131fd570473947fb62ab151cc7e17bf2f4ff79fd13470182e60a226c53931ba13473b7e9489b0a626390293054eaacf4a5a7178a9db8e405db52de15ad997bb1b21bafcef9ab301aab7a7bc51442d8cb4392f9ac1dd4443a07873c"}, {0x100, 0x0, 0x81, "e9a98a96cf268916bbcd45545ebe847ce6b2cfc56d7c735c8e86c9767b408b0254ed223a001e2adec95485a0b9c518c07553c72e310ae6a138bb45f14f33d22def4c5b972ae9ae0b75948ec3e29b010dd1bfc91be262b4d6f81559608c070d84c7127553149c189cff2e13606eb760d01fe2dca13220b7325e9dec495c02b99962cb62f38403053ca63b824439aea5c49d5254733f5caa548c19dabbe2c2709b5eacfccfa7f5ca39cb29ab93972edafe10e5e866c617857364dc8099a1015228fc8bc1cd536adc8c520a514e30f629d0cdaa6f5769c7e71b899a91c9a95a294c9afe0514753113d56bc3969964fea9"}, {0xc0, 0x88, 0x5, "44d2b2fe55925e88f1553e8c72db2ee243809bc42eafc15d2cdbf1206bf29ff6d3b36a6849ae3fd7cdba2351a720d23df860f6bcabecd1c38f2c461973ae30c17e060e9451f4868b8fc15ca4591826ad345c159310cb4330e41952c92f3a81752683adbf613852766b40ef5629098254eeb5811e6e6211a4275dd6744c806e1c60db8f9b78a766ce195685b7f7fa4840bbf526e04c8c147dad248e676eb366f13e9865f67c275a17f380dc"}, {0x70, 0x115, 0x0, "6a975fa0f9fcf88a8beee1214eb30be909966c40af843e910574603070885bf0c0e3694844d083b86d70cd179482bc90914a3d990eee009d12f806b70786967edfc54c1f7fd58fb3bb33e47fe36c0aac38f15f95c604d8fb02c79e38d12cfc"}], 0x610, 0x10}}], 0x5, 0x40000) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000001c0)={[], 0x4a00000000, 0x7, 0x6, 0x0, 0x2d75, 0x6000, 0x3000, [], 0xfff}) 17:48:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 307.710603] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:32 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="01"], 0x1) 17:48:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x102d, [0x20000200, 0x0, 0x0, 0x20000230, 0x200015f0], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}, 0x10a5) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000002240)=[{0x2, 0x2, 0x9, 0x200, @tick=0x10000, {0x1, 0x8001}, {0x9, 0x38}, @connect={{0x0, 0x2}, {0x1ff, 0x8}}}, {0xb694, 0x1, 0x3, 0x4, @time={0x0, 0x989680}, {0x8408, 0x3}, {0xffff, 0xd1}, @control={0x8, 0xfffffffffffffff9, 0x3}}, {0xfffffffffffffffa, 0x100, 0x1, 0x7, @tick=0xada, {0xd24c, 0x6e1}, {0x9, 0x6}, @note={0x1000, 0x4, 0x4ac, 0x10000, 0x89}}, {0x7, 0xfffffffffffffffc, 0x5, 0x7, @time={r2, r3+30000000}, {0x1, 0x36f3636a}, {0x589, 0x5}, @quote={{0x4fec, 0x7ff}, 0x3, &(0x7f00000001c0)={0x100, 0x2, 0x0, 0x81, @tick=0xff, {0x8, 0x3fc}, {0x7, 0x9}, @time=@time}}}, {0x8000, 0x82, 0x5, 0x2, @tick=0x10001, {0x6, 0x2}, {0x9370, 0x690c}, @ext={0x0, &(0x7f0000001240)="8dfd1f960cda4a274570c24e1b6570967806522700b047e090d49c3d40d057b66f04e4da6005a4adb5db3b5a5486f2dfeadf7fb892f55c86dc3b3925425ae26802e27638b68dfc6d1dfef70ef301b303c4e701fb5bde27ae9fe941cd7089b30922761e499541bb30d5bdb7e3fe47e8d04b6f62dde055d9c57339738ff4b9cc4e26cdae100e9110b0b5ea23c5f49994765f01cdd4d7f31cb8366eef9cab3485ea3991f1622dce4d9a494920b772700f231537e3faae9d828a320acd5bcac09cbca11586f636a3fb1b2c12d9d23ada6eaaa5c8cc67c289f0554c8d1783b2864df8ea0e06a342242276d2e93e75a18fcf2e39ce793d5060e6a21d13945e98c92691774f2fdd3abd8a543bdf9c0ff997d14ea4ab5f384d5c4add2f83637df7ae2f7e9fe697e090384d2db03886f454243c56b13d2239029ee728780987691ef315d25be05f4b1ecd70cf67ceb56ded26c4868ddec5a1a21848728a2d8449c5c0edac11df7c8653b1ba58fc13d52adddfd891dbe0939952ff12565c01866d17f4d01b73dbcfc513926f452cc2794f7c54652ddd65660e3b8918674a12243398be79831d3b6d2d39fe9d41ec87794c44b0ba438989cbf62a638a8e75df3b7d10345971b35d16fd3383f0a507f0ca7acdaacbfae220b5a384a97b36bb36ed23a2c19a0b92818f89bef891906d8c11eb3e70c3108e0c7bb92d80d1fbc7ca3b6e7e93a0939fc96f07f4ebe129a723f405f4bbca8c653aea0c6fb5d01c7221dc24dc35397039651a8238a722c2f2b51495a03891543af52aadd402da513ab33cc50ce796511d9f8743436e57a7c50f9f4bbb27d74a401fff2efc495b8d5dd6d3244c458c5283ac75d17bed408de34d7b9faf365665b364067c379a914b2d985116fb35954795bfbbf39ff6acc831985cdaf40ad3bafbf39461ba70194b8165e8bbaa5ebc680f549d1d9b37f63665412118354cc23d6a1e37c90c61ac3c2a2d54ead6f7baddb9a7d26038e6935f4c2dc239c5f805a5e1153bf6530c4964df7a80bf3399f9f2c79031c43495593021defbe1bc3638f90c5f55677ddbb1c7ff5c28bc20c35bfca27f6ea8887a1b1a44e782adde8eb7b5cb82c31da476751434747fbec591776ca2ec3120b06bd1fc2e4bf316ff4ae0df3806ccdc0b29fd6e4f0939c71cee307b6341986dd1f678ad3a7829de54dc15cf2096dcd7a32a1075bb5a6e3715e1b84e9a70fd39eb869e966cf9e6ccbc1e9331fee3e4c22ec5ca701046ca734edeb5f64b4b4497b584c84184b48da63b388b4784b8f9bd91871e24d1b8017acd0adc2f9b5a3fb22f2a40811a36d3d6e26ee54a47d5f54036e4aa8163ea8be7d822f8d31de7a58a7ac7b9a950005831c9af8895bd4c4024604a3cf061d29bda2e96147881b0da4e89c351752758cafd1499c7d6572e9f6c4d4dfca342451294a035ba55357a8d8f651a1c9e4e79a96c6cda06e4856e76990c120991fa806592e138006b13e180f7a1951c7c05ffee4c69918b5a8d578fb6ca2ba28c331b6f96d899567260c8908ad59cb96afb60f57737dffebe87defbc5eda2f13f7875e6a872f46fb5988f9ed1c38553b799b05f63f2e06e1e88847c6cefbca210b7491ec202f58ecd9618651c6a5087bc2625dc6babdf33efeb76f819998fd502f5c179998dd18aa8e60cfb3d2ce92ee4347004bda2a5541c4f9a883bfc8ab89d57ed5a201b6fc169f6bca7702d76718dcedf893b1d2f87ab382363dc240b12e642a21754665ff61e55793fdf1b0c126d88bdad8fe401500f6c151294bea30fd2db1014745bd101d62af54b3ba4448362e5635d47e0627325736d4399f0125747cba263806427b7bf8b58cfae7f9f7255bebdb92b8be7dee1804ed8d303eafafbf785be22e6628353eabf1cc44b235bc36b2ffd2bcd109363d2b52f0d658763b9c7231c153a92dca13df687834009bd3626fa23c5362aaa3a385cad4248399a882c186e25f46a4c100bb9a52dd7c0b9d15cab5f1d0de3d5c7d362f5714667bfd7c65fedf859dc5b963183e4c910113c0f7b1e9fcd75a3a1aa3fc3e49f673c5fea3fa2a71a9e5bf3ee8d4cd373c29a2024973dba163eafa0bf4cdb7fd536f8e782d49953d819d225d3f77dba1960ec4d979bcf48538cf1a67bd64e37d0673a31e3268a387b99c031ec69abc841bfff242908afe6f6e3411b48ab1f36811f4fc5e64c714a3669d936900d18f7bd60a9bba84823d42d2fedbd750bcc7d2ff9bc8fd3285a97e8c19f6060925b9d629655602154c182d3bbad39db818a2b6a1247c79e087dc49d618865c8dd604594288225b132709089f04077620fb48f9396499ab8b68b8d05fe3695bd1cb8534fd864b69f871b65d7b680c5da689a6f6f587a4dececcb4238b76356358f64edca0d00d2bb37bbd624d7589ae3752c49d16c0250b48562c611c2e5593939dd94a824bbf4f89a9e059afa0d797b730ab8c22f64abd86eb5ffbd0ccd7d37d8b2f8e926beb50da8b104ffb74cc21149ef9653a835ef42581469d625169a8c88d28b63b9951e65542a47db20eddd8086f2e6c4cc779c7b1763d00266a4aa1205529064f891dd94c6d6ac6865f1856eb470f41cc87390fd4a5f773a8d260b12ee4bac983b0c291891d5e97cea11afcc75a5f05c05a6283c326835dea4bc8464d0cdc5d0ae95aaad0266c4a500d4add93520f935a67fc9f05496f0f4b1a70003bade630f33089f587570b619ecdd18160cf48c573ad260ad24453d4c3a39d3b099855fbb93b43db81ceaf70f494ac628ebbe71535171b999de54d111b7b4f9d8d9fdb089da2a3877afa928fd3c6c209196e620dde1be43201109c4f905471e853518379083e9360884ced30ca0e194509acd233e50e6957b6c96aa5edb13e3f3942db9a665e5456a61f7e2df79c6c0da4f6c71f3a018805d08fb44e53613dc6bcc5a65a85eed9c34b9d2790eb20663f6ed8528c65cdf14b22d19aec63b8bc47ceb6f8a5509160a2bcc92b3042c33a2e261261b13d26cf050a2c951833d1bfe19773de7b05b2acf30ec195e191fbf053083074ee41f747cf61f4d9d2e7e3665baf22ddd5adf6227121428c420e16e1d0ccf380d5dcbc3dbc7b20d5877b84c3dab71aa5623ac9af4b46fa718f8fa7414553ac5ef71025b534636e0875897af13a38830539ad57623eb0a6fdec1512f16098d699046d375e2ee033daf2633d12a3c49ea35f942985eca3c77e17a7aca218720a5888f0ad0d522d4c6068a70f71624b58797313e23a1cc3743bb82b776f6591fdeff25a8b69acbcc2709a4c4d300fab7e41596ae94111bfc0d953ff3b08f4f75851d950d0ac60ae9b88f85db2f3e3ba9e56e4f8411edbc6331186613fd9c0e6c82c3328bf95962403668d81bc7c02ab4ed89d5a9f1d2447be9a471711b9b850b5e02b327f8a6e693bc1cc5bdc9d20b83146b4776fd0943cccbb5031f04a5192be74aa6cd6f5f72728c635146ed810c577cd04969f5db6d9c9c8942896819b35062065cc9d4d7261ca586bdb57ed8e523ff959e07ad0855adfb85882d458849c48265fa1a9f677782fb638f695232d0e7f078c44e72cd585eb9569b044ce73731d6416fcba246821079c31cb44d7abb0d7f601b444889f10dcbd54fd4361f02e327dbe9a2f7bc802108547236b14fd056d068da4fe12d4975f5244510e56496e1d8c2f755f2b52224c0079a861135c467ac15a17e43124ad8bcc530667080d809cc23bf351a8c5a530d90f379f7f1313c25282817d164ba5a2215e29edca1109726e02aee2a4fda3fbfcfdb854d8667df710660a1c42c5fb90dcbcecc21c0bf90abdbc8268aaf365c7b92f18ee4809189b53c54bdd89b2c0425919084e8cfe2327390a3b659457e36ed1fc75d878190f1371262869805c33f7bbea57dbbae5cec72e4b51384a327a24a2a04bf93007b76a1dd445c42b27ba0461b44fd875e0208f54d44872a3a8065b7310fe842f759e187f9ee0ac057b52a2972bd90c9a3b480fcf16377978ec0d294246dfee8daa83236c1b15fc5e3c6efffcaa6a24cbadc39e7163b4f31cf3086241c58173a21ae8016d1048fb3bdf19a063b8164a799556af03c20725466e611df4735277d943560a0fd61e2d7e7c49d0e8f476a6f50110f3b4ad1deb29c31e264c6dab69ed659f4acbc8fbe00454ce8d4ffc38b149cfbecfd07146a67cf16174992a7fe0a5d69a4fffa60d91347126874e1a6ee2bf2ed134ce8c84d163adb626dfdac57451284cfbc493a95889dc068db5f91e2f90c8ceff3eb3a5a2c7f997f5b407b6f4fc6317058b95ab21cc770f3584d4a0864ad2b63c148abb4bcb42408049761327e93b57fd93eb6396397d61deff9bb7701f648bbe8e4c2c2e1e7745bb0e6273c68afc7b4159bf8107fec3cbc571d52b287319e2b9831db51c63d66c1538e34f8d41da1cdb2ab65ae1d8a2eeadcc020a5ff725284c2869da7d536cd6b5d22f0cfdf63a6d4ca0b8068fc4673b2e62e1b6b477f775d3b89a0599f5808ccf280c5f9b940a7e177169ab20cfb122607aad7bf1a35b731b7a3118174236a0df06f85d5c0d904a7029e86577db2a7d2dc79f9177ee26636c7bf307a666d9a20f8685a9de05c2f123b740099b1d095fd78509c88f955aaaab0e63864e563dd8038b6e4de6861ecfdf5548dfe878b39a64b2a0c9d300e56dd4c20e0e4615323ec8649dc2e89f536e1a01505834fe9b94999941c490161c6290f7df4107fe1cec43db65743f892e780ce4a6a5bc8a527ef195663e2ebc49c3999cbaf7cb4a78f86e65bdce5b203a74008dd8d1d0342ddacdc988cbb56d726971af6328fe89eefe51ceba9639d5853da7db0915efe8b60f6dd1bb2b97394e3a3c62e8317f7bc1808d6542d0446f0b2ae1eede9653d65470797982311b3957a8ef7b366cc823c82364260c112e0c9b5ce03bb33c53e66bd704871d42d6e1644f4e42210dabe63c3861912a176acb443063329a108612b0ba8af40d2caeef16c6b5c0d53b236e2b3f9c452063b5e534a56663fa538aa314cb17ffc42f97a644dea040abff4cd9da38239f22817fa9ab356d8acfaf32c74bb98cd2c380821760882ca68621bbe2b4c274746ec615c8530827249137dad3f4aaa23ce9951508581db6b08a496db6125833095c6b3a91d35f4f2f47dcc43259be7d430644093de666888b3924ad1274be1443eca0b4f0c56ffd5d1309527bfbbdedfd763aa59e5143bbe4073734572e710dd05571b693a48f93fbe3e0204337870252806b535e41b4bdff93eb0a3a3279a96cc91f72f55632c395d628356b1275ff76305c084334d7754a06209fb0cd11b923941b39015eb0eff648b0c213115aab5357de9f624117e90d48341606af8fd2975398b0a95d3e381f7c05fad4808baa39b112170168501fa78c1195b143f3c2105d102d27e0c50888a623ca7756f80fc3209a7f960d07a1509266161c694b40028ca1864508844f6ca0113ec5328c477e4cee6b60630e169aaaef8e18bc0836108ac01b23c837730f8072b22140870ae3d32f6c100fa8115d2d9de1f67112131b15fed35c9c0077d8e36e1348b71e4766088cb6c1635667dcae2af77f584f995371b5c3d4065e385299b3b186d62006740e742e00574e2c4ee3bf3aa93ba5ecc010eb9b8dd2523286d1741f2805004322288e8ce55ec7d236cec4a224596434ba0c6a219d70ecb28e6fe61945c02af3645f3b44773b8b13d837c83c93a3aecfee339c4d9a8d2306b7939c0a7a8728f964c87ed218423cb97e7c3439b307f4a1a65aef2ea25e4"}}], 0x336) 17:48:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xf3, 0x0, 0x5, "23dda90d026754ba4deeaa7ca68ba598", "3ba7c1de87f1088dc19908406fc8cbc5974899a0203dae3b1f18d7139cba2cda6faf21f0b9503d436bd80c7de5b539293a055dd39d6610dbb82cfc5ff96466924a97d793765e3870e67c48609168db21e084b6c1dd9b80fb00e675141eba04ca09bbb9511dbfdb86cc5c47917e342bd6bd9bbee6a964953d98cebb1c76e432a9d4f30d9911278b1cf582bd6b6cba287848e2e1a4f5c364124d79cc8a158922aecc3bc8d488f414ac4f5bcd3161542e9c920d4e4babf19f11e072ea49061a3d7249ef27ca59ec865d8f137a9ae5aa49d748fb8c1c5d6e66a41ed2732e4e92"}, 0xf3, 0x3) fsync(r0) 17:48:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:33 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x700000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:33 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000180)={{0x2, 0x5, 0x7, 0x3, 'syz1\x00', 0x7fffffff}, 0x1, [0x6, 0x26ac, 0x3, 0x100, 0x80, 0xfffffffffffffffe, 0x101, 0x80, 0x4, 0x48000000000000, 0x0, 0x6, 0x1, 0x8, 0x5, 0x8367, 0x9, 0x100, 0x9, 0x6, 0x9, 0x5, 0x1, 0x2, 0xfffffffffffffffe, 0x6, 0xfffffffffffffff9, 0x8, 0x5ac5, 0x7ff, 0x3, 0x2, 0x3ff, 0x9, 0x1, 0xffffffffffffffb7, 0x101, 0x2, 0x9, 0x65a7441b, 0x2, 0x1000, 0x0, 0x5e, 0x0, 0x9, 0x81, 0x6, 0x9c2, 0x10001, 0x6, 0x1, 0x7, 0xb, 0x5, 0x10000, 0x5, 0x18000000000, 0x1, 0x6, 0x5417, 0x3, 0x401, 0x9, 0x8000, 0xfffffffffffffffd, 0x15, 0x3, 0x2, 0x8, 0x1, 0x7fff, 0x200, 0x8d8, 0x6, 0x3, 0x3, 0x3, 0x9, 0x100000000, 0x8, 0x9, 0x253, 0x9, 0xae1d, 0x4, 0x0, 0x9, 0x80, 0x7, 0x3, 0x800, 0x8001, 0xffffffffffffff80, 0x100400000000000, 0x4, 0x6, 0xde, 0xdb, 0xfffffffffffffff9, 0xfffffffffffffe01, 0x4, 0x400, 0x8000, 0x3, 0x3, 0x9, 0xffffffffffffffff, 0x0, 0x81, 0x3b, 0x8, 0x0, 0x9, 0x100000000, 0x4, 0x100000001, 0x1, 0x5, 0x9, 0x2, 0x70, 0x1, 0x100000001, 0x7, 0x1ff, 0xffffffffffffff81, 0x7f], {0x77359400}}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) listen(r0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000900), 0x4) 17:48:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000012c0)='/dev/snd/pcmC#D#p\x00', 0x800, 0x200) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000000c0)) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1}, 0x8) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$clear(0x7, r2) fsync(r1) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@int=0xfff, 0x4) 17:48:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400204) read(0xffffffffffffffff, &(0x7f0000367fe4)=""/91, 0x275) 17:48:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000380)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) renameat(r1, &(0x7f0000000300)='./bus\x00', r1, &(0x7f0000000340)='./file1\x00') link(&(0x7f00000003c0)='./file1\x00', &(0x7f00000002c0)='./bus\x00') 17:48:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8000a0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:33 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) accept$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) 17:48:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:33 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000002200)=[0xee00, 0xee01]) setgroups(0x4, &(0x7f0000002240)=[r2, r3, r4, r5]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r6, &(0x7f0000367fe4)=""/91, 0x275) recvmmsg(r0, &(0x7f0000001f00)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)=""/223, 0xdf}, {&(0x7f0000000340)=""/107, 0x6b}, {&(0x7f00000003c0)=""/197, 0xc5}, {&(0x7f00000004c0)=""/88, 0x58}], 0x4, &(0x7f0000000540)=""/149, 0x95, 0x3}, 0x9}, {{&(0x7f0000000600), 0x80, &(0x7f0000000b80)=[{&(0x7f0000000680)=""/241, 0xf1}, {&(0x7f0000000780)=""/168, 0xa8}, {&(0x7f0000000840)=""/107, 0x6b}, {&(0x7f00000008c0)=""/222, 0xde}, {&(0x7f00000009c0)=""/159, 0x9f}, {&(0x7f0000000a80)=""/67, 0x43}, {&(0x7f0000000b00)=""/122, 0x7a}], 0x7, 0x0, 0x0, 0xfd}, 0x5}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000000c00)=""/132, 0x84}, {&(0x7f0000000cc0)=""/227, 0xe3}, {&(0x7f0000000dc0)=""/182, 0xb6}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000000140)=""/39, 0x27}], 0x5, &(0x7f00000001c0)=""/31, 0x1f, 0x6}, 0x7}], 0x3, 0x1, &(0x7f0000001fc0)={0x0, 0x1c9c380}) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x1017d) epoll_pwait(r7, &(0x7f0000000180)=[{}, {}, {}, {}], 0x68, 0x8001, &(0x7f0000000200)={0x400000000080}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)='trusted.overlay.origin\x00', &(0x7f0000002300)='y\x00', 0x2, 0x1) 17:48:33 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x2e) fsync(r0) [ 308.507014] overlayfs: './file1' not a directory 17:48:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xad00, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000380)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) renameat(r1, &(0x7f0000000300)='./bus\x00', r1, &(0x7f0000000340)='./file1\x00') link(&(0x7f00000003c0)='./file1\x00', &(0x7f00000002c0)='./bus\x00') 17:48:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:33 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\b'], 0x1) 17:48:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0xbf, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200c0, 0x0) write$P9_RFLUSH(r3, &(0x7f00000000c0)={0x7, 0x6d, 0x1}, 0x7) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') fsync(r0) 17:48:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:33 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:34 executing program 3: r0 = socket$inet(0x2, 0x80005, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001c80)={&(0x7f00000017c0)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000001800)="b4", 0x1}], 0x1, &(0x7f0000001c00)}, 0x0) 17:48:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffa0010000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) fsync(0xffffffffffffffff) 17:48:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:34 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x300000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fffffff, 0x20000) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0xfffffffffffffffd) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0xbf, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200c0, 0x0) write$P9_RFLUSH(r3, &(0x7f00000000c0)={0x7, 0x6d, 0x1}, 0x7) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000001c0)="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", 0x1000, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r1, 0x8) 17:48:34 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0010000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2380, 0x100) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz1\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x501000, 0x0) ioctl$TIOCEXCL(r0, 0x540c) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24, 0x1) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x3) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000100)={0x5, 0x8cd}) fsync(r1) 17:48:34 executing program 3: futex(&(0x7f0000000000), 0x3, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10080, 0x0) mq_timedreceive(r0, &(0x7f0000000100)=""/93, 0x5d, 0x100000000, &(0x7f0000000180)={0x77359400}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000001c0)=""/246) flistxattr(r0, &(0x7f00000002c0)=""/98, 0x62) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)=0x0) wait4(r1, &(0x7f0000000380), 0xc0000007, &(0x7f00000003c0)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000480)=[{0x2, 0x200}], 0x1) mq_timedreceive(r0, &(0x7f00000004c0)=""/172, 0xac, 0x200, &(0x7f0000000580)={0x77359400}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r0, 0x0, 0x8b, 0x72, &(0x7f00000005c0)="7eff9d684d1257eeb55a7df373841619520b1b9128805a47e710ce9a18406c38fa3607977e4ce0b3502f4685309b9db6882799ecfddda281aae714197149507ec889f01998ab195e4198dc25c9be8ced6a04f9927d11b2dd3d401ec41a31ad9756b9fe74c49e2f7d9a3de13bf3aa30c3337e842d4532dd433eaf5793ebf33780b6f8b837eb1d89c4d71051", &(0x7f0000000680)=""/114}, 0x28) mq_timedreceive(r0, &(0x7f0000000740)=""/180, 0xb4, 0x7ff, &(0x7f0000000800)) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xacd, 0x0, 0xb, 0x1e, 0x0, "71f478758089445fc0e4242a8f7abd1906a9e46f5f50a4b97c369700b524d1b5799314efef4d3d7a562b3006dde3a0d30093883b247764e0ce150ed709aca609", "4fc777a2344d5919c7e5789fcdff7a7cad74faf98fbdba85ccbb0aa02807cd3d0d8707b181b5e20310f9eb6d08a9e3b655985d509f533592454e99afafac183c", "b83841cd006fb6bdd3daf3a5bab38a05ae0534f8bb92553a8c44d0e98f2dfaa0", [0x1, 0xe60]}) r2 = syz_open_dev$dspn(&(0x7f0000000940)='/dev/dsp#\x00', 0x635, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000980)={0x0, 0x2, 0x9, [0x5, 0x7ff, 0x8, 0x0, 0x800, 0x78c6afbf, 0x4, 0xffffffffffffff99, 0x670e6ed2]}, &(0x7f00000009c0)=0x1a) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value={r3, 0x10001}, 0x8) open_by_handle_at(r0, &(0x7f0000000a40)={0xe5, 0x883, "1a31bbac63e4338006888241a2279c594de19652f5f81adfff55da5b1ec1dd06e78dcc84e52311b776fab762529baf9e359c144667bb6a8f5bca13bd8c6980ef02c093aa97eaf5be02dc694669af964136d84a2683e0d7d0d373bd13ecc75b991ff1b838963bd46c8fca902f825beda93157f00df8c6ce1b2e2e607bdfcb60ef52cdb109e4c535921e4efee515f2125c242bf3e1ba2b97835024c20286faf7405841cfb137806e934883c6f900ebb4fdee3c884038c736d80d0b89ff34e9a04d0ad2dc889c815fa61ad14292a7853881e4bb6f369600e05faa41b4ceda"}, 0x280) clock_gettime(0x0, &(0x7f0000000b40)) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000b80)={0x1e, 0x7, 0xffff, "b61c3d9686e09c86b5ffb58cf168ac3c5d62181cc1c4b5fccabc9e1f5d8f"}) r4 = syz_open_dev$amidi(&(0x7f0000000bc0)='/dev/amidi#\x00', 0x3c5, 0x20202) setsockopt(r4, 0x1000, 0x3, &(0x7f0000000c00)="0c0e48d700aabd418d52a47c53a79a8737333859079a4d47923714366bd261a8573cb1a288ccebf67301a3924c24885eb377a1dc23aaf668d38d7730d26dbb6dc0c7abebe9e5489bd60017599aee176ccce713d33002f60ede7f64ce0faa365289e823a35a5548d594a7f005590ce93bc226cc8950c769b7a987d7e2e142f4c2cce4de4203449189232d91dbbc6bb6962261c44d96045d7e7ac8d80fed73342d53277f2b1dc8b1016d7e61105fd127c21f685d81e09069d0257fb672b7f99d2e77677bca37cfe6", 0xc7) sendto$inet(r0, &(0x7f0000000d00)="ca9a3abff32d6ea18b7f441fe762d99429bb", 0x12, 0x20040090, &(0x7f0000000d40)={0x2, 0x4e24}, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000d80)={r3, 0xb}, &(0x7f0000000dc0)=0x8) getpeername(r4, &(0x7f0000000e00)=@in={0x2, 0x0, @local}, &(0x7f0000000e80)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000f00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000ec0)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000f40)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x2, @remote, 0x4}}}, 0x90) r6 = add_key$user(&(0x7f0000001000)='user\x00', &(0x7f0000001040)={'syz', 0x1}, &(0x7f0000001080)="48bda751f05db8d2225661dadfc8f0d909c2defa133ebee310f17876fa42e4a031eb2841afc332acf66fda9ef4ccf0a79fccb0a34c422ea3c3a942c6c030c29752955667eb237be17b1dce14bc3fb2f0c0d307847304c96bb986e4182a27b679d0a073f7ba545c41c0f775122a11c11645ff460c1a48f796bc4336008071e99b3ec6945ab46bc4374688ffc58bfec055644ff10cc9f98c70ce6eeedd8f2d091ad35bf678d9f1d75edf104937c44523deb3578aa65d194aa1da54deb6a17008f4d95af5ed75e661512ab751efb310b50f99f5f02c615034cc595c13be446e852c01353444f4926966b7dd1b2f5515539e", 0xf0, 0xfffffffffffffffb) r7 = request_key(&(0x7f0000001180)='cifs.spnego\x00', &(0x7f00000011c0)={'syz', 0x2}, &(0x7f0000001200)='/dev/amidi#\x00', 0xfffffffffffffffa) keyctl$link(0x8, r6, r7) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001240)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$EVIOCSFF(r8, 0x40304580, &(0x7f0000001280)={0x56, 0x8, 0x8001, {0x5cba, 0x800}, {0x8}, @rumble={0x7, 0xbab}}) 17:48:34 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000140)=0x1, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3ff, 0x101000) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) read(r0, &(0x7f0000000280)=""/91, 0x5b) 17:48:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000000)={0x5, 0x3f, 0x20, 0x7fffffff, 0xa, 0x7}) fsync(r0) 17:48:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x700, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x509202, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@nat={"6e61740500", 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) 17:48:34 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:34 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) [ 309.747124] x_tables: eb_tables: snat target: only valid in nat table, not nat 17:48:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:34 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="be01000000000000d102da0b1e10e11cb53fd011848cb8fc47844786272d1da4f6ace64b6560238567fd2a53d5319e6c0cfff844b7c55b96d7dfa53bc6c618d24830e3fb2c43fb8e79419f52fd42d59d1844291fe4f4af7a127c32db84200d43449b3793ed6351692366a1c330b226c7e3e4a0814d00136cef0f454a3e9ab4dc3f255d5a63a9e7f9e483fe68eb905bb63643486e56e57567bfb17ad84e60feecb4f4a718e3dc1248527b9f85807e9b18d88878c02883d52ccee8620e4e3e"], 0x0) 17:48:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) r3 = memfd_create(&(0x7f0000000000)='(system-$\x00', 0x2) connect$nfc_llcp(r3, &(0x7f0000000040)={0x27, 0x0, 0x1, 0x7, 0x7, 0x7fff, "0842732b97510d7febc3448a43c515301ecf194e08f6fee475f6f43f3ed74ded2320b42be896d058194f208d975dfc7dc354c401eb9ef854bbe7c2bc2b23c4", 0x31}, 0x60) 17:48:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x402000) ioctl$TIOCSBRK(r2, 0x5427) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000240)={'team_slave_0\x00'}) timer_create(0x7, &(0x7f0000000080)={0x0, 0x37, 0x0, @thr={&(0x7f0000000400)="9596e3180f75f2e74f0846bde034d05a8cd5e4e8f1dd8f86193d5b258c04152d970f4ae5b25c8037f768ac1668644f2e2f39c64e19c9fea6c7b0afc1c250b6f1bd289e44366db00c518f87f7d639e4aa6900437ce8adec940488dbaeb1f62a51ea3916c98f72801a4a9bf661d2965dbc", &(0x7f0000000000)="0a6fb7d2e47ff285f560a12a44bff851cfabcf58809dc395c187584a0320d20936a592be55f41a6ec8498bd9413ffe2343ead595c32b"}}, &(0x7f0000000480)=0x0) timer_getoverrun(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000100)={0xffffffffffffffff, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 17:48:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x600000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/zero\x00', 0x200, 0x0) r5 = getgid() r6 = geteuid() fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xe8) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000640)={0x340, 0x0, 0x5, [{{0x6, 0x0, 0x2, 0x7, 0x10001, 0x800, {0x0, 0x80000000, 0x3f, 0x7, 0x80000000, 0x6, 0x7, 0xc69, 0x6, 0x3, 0xe5e, r4, r5, 0x7, 0x6}}, {0x2, 0x0, 0x1, 0x401, ','}}, {{0x5, 0x0, 0x8, 0x6e14, 0x5, 0x5, {0x4, 0x5, 0x1ff, 0x2, 0x8, 0x9, 0x8, 0x5365, 0x3, 0x3, 0x5, r6, r7, 0x1d22, 0x6}}, {0x6, 0x7, 0x0, 0xffffffffffffffff}}, {{0x6, 0x1, 0x100, 0x4, 0x0, 0x101, {0x5, 0x100000000, 0x7, 0x3, 0x4, 0x5, 0x5, 0x5, 0x7, 0xa44, 0x4, r8, r9, 0xd4, 0xeaa5}}, {0x0, 0x40, 0x10, 0x400, 'vboxnet0trusted^'}}, {{0x6, 0x0, 0xac, 0x9, 0x5, 0x4, {0x3, 0x1, 0x7, 0x7ff, 0x9, 0x6, 0x48, 0x1400000000, 0x3, 0x80000000, 0x4, r10, r11, 0x7, 0x7}}, {0x2, 0x2, 0x17, 0x1, '#%keyring*&]{\'vboxnet1^'}}, {{0x4, 0x1, 0xa, 0x8000000000000000, 0x4, 0x400, {0x0, 0x3, 0x6, 0x2, 0x7, 0x6, 0x2, 0x7, 0x0, 0x0, 0x467, r12, r13, 0x9, 0x10000}}, {0x6, 0x2, 0x7, 0x10001, 'keyring'}}]}, 0x340) 17:48:35 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x62d0) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) fsync(r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x82) 17:48:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000380)) shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/96) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000180)=ANY=[]) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000140)={0x1f, {0x0, 0x0, 0x57}}, 0x8) r0 = getuid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x2000, 0x0) ioprio_set$uid(0x0, r0, 0x6) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x200000000000, 0x1, &(0x7f0000000500)=[{&(0x7f00000003c0)}], 0x0, &(0x7f0000000180)=ANY=[]) [ 310.205408] EXT4-fs: 14 callbacks suppressed [ 310.205420] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:35 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 310.296872] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xad00000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x80000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0xf3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x1000400, &(0x7f00000000c0)='\'^\x00') fsync(r0) 17:48:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 310.425504] kauditd_printk_skb: 41 callbacks suppressed [ 310.425520] audit: type=1804 audit(1539712115.495:187): pid=10933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/146/file0" dev="sda1" ino=16710 res=1 [ 310.462797] audit: type=1804 audit(1539712115.535:188): pid=10939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/146/file0" dev="sda1" ino=16710 res=1 17:48:35 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 310.538179] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop3 [ 310.599020] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000140)=&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000180)=""/241) read(r0, &(0x7f0000000000)=""/91, 0x5b) [ 310.668752] audit: type=1804 audit(1539712115.745:189): pid=10957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/147/file0" dev="sda1" ino=16730 res=1 [ 310.699656] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x24880) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x7e, @dev={0xac, 0x14, 0x14, 0x1b}, 0x4e22, 0x4, 'sed\x00', 0x2, 0x1, 0x17}, {@loopback, 0x4e20, 0x0, 0x1000, 0xcee, 0x400}}, 0x44) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:35 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 310.719213] audit: type=1804 audit(1539712115.765:190): pid=10961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/147/file0" dev="sda1" ino=16730 res=1 [ 310.828698] BTRFS error (device loop3): superblock checksum mismatch [ 310.873135] BTRFS error (device loop3): open_ctree failed [ 310.891246] audit: type=1804 audit(1539712115.965:191): pid=10975 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/148/file0" dev="sda1" ino=16730 res=1 [ 310.935095] audit: type=1804 audit(1539712115.965:192): pid=10979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/148/file0" dev="sda1" ino=16730 res=1 [ 311.013876] BTRFS error (device loop3): superblock checksum mismatch [ 311.022192] BTRFS error (device loop3): open_ctree failed 17:48:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x500000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:36 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="82"], 0x1) 17:48:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000380)) shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/96) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000180)=ANY=[]) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000140)={0x1f, {0x0, 0x0, 0x57}}, 0x8) r0 = getuid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x2000, 0x0) ioprio_set$uid(0x0, r0, 0x6) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file1\x00', 0x200000000000, 0x1, &(0x7f0000000500)=[{&(0x7f00000003c0)}], 0x0, &(0x7f0000000180)=ANY=[]) 17:48:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000200)={0x20000000, 0x598, 0xf}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x6, @ipv4={[], [], @multicast1}, 0x81}}, 0x7, 0x7}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x20, 0xb, 0x80000000, 0x8, r2}, &(0x7f0000000140)=0x10) fsync(r1) [ 311.074223] gfs2: invalid mount option: /dev/vcs [ 311.079700] gfs2: can't parse mount arguments 17:48:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x400000000000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 311.161286] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 311.171304] audit: type=1804 audit(1539712116.245:193): pid=10998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/149/file0" dev="sda1" ino=16730 res=1 17:48:36 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) dup2(r0, r0) fsync(r0) [ 311.251994] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 311.274317] audit: type=1804 audit(1539712116.275:194): pid=11004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/149/file0" dev="sda1" ino=16730 res=1 17:48:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0008000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 311.435344] audit: type=1804 audit(1539712116.425:195): pid=11017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/150/file0" dev="sda1" ino=16735 res=1 [ 311.495937] audit: type=1804 audit(1539712116.425:196): pid=11025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/150/file0" dev="sda1" ino=16735 res=1 [ 311.557752] BTRFS error (device loop3): superblock checksum mismatch 17:48:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)) r2 = accept4(r0, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) connect$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x4, 0x9, 0x2, 0x8, 0x4, 0x5}}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r3, 0x44, 0x20000000000008, 0x7) read(r3, &(0x7f0000367fe4)=""/91, 0x275) 17:48:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:36 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:36 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, [], [{0x0, 0x4, 0x1f, 0x9, 0x6, 0x800100000000000}, {0x3, 0x7f, 0xfffffffffffffffc, 0x0, 0x4c1f, 0x6}], [[], []]}) fsync(r0) fanotify_mark(r0, 0x11, 0x8000001, r0, &(0x7f0000000140)='./file0\x00') 17:48:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 311.605717] BTRFS error (device loop3): open_ctree failed 17:48:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) r1 = geteuid() mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x100000, &(0x7f0000000080)={[{@xino_auto='xino=auto'}, {@xino_off='xino=off'}, {@nfs_export_on='nfs_export=on'}, {@xino_auto='xino=auto'}], [{@euid_lt={'euid<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, '['}}]}) [ 311.719161] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:36 executing program 3: syz_emit_ethernet(0x163, &(0x7f0000000000)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, &(0x7f0000000180)={0xffffffffffffffff, 0x2, [0x4, 0x380, 0xb65, 0x100001]}) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x1f, 0x400100) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xae, 0xffffffffffffff01, 0x0, 0xb, 0x15, 0x0, "bb8e57a14b93ead063edaae6874ad777bed1cecbad8915e44bf8c2d8ddfe24e8053814d1b116383c81e4ce4401d78ac795956fde426a47b9bad6ace8e0e15880", "89951d5a5383819b0d632ff37aafe6c230bba64364024dd5ad8c022d368b220563023b1162fd3bbd5be302f33bf70af4dfcd91c230780d3956c20e60c7a75093", "887b820754f83b368cebc4a68ae7c41110565e640e79099a76ed60da02fa77cd", [0x1, 0x7]}) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x4000, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x6, &(0x7f00000003c0)=[{0x8000, 0x6, 0x5, 0x8}, {0x0, 0x9, 0x4, 0x7f}, {0x3, 0x101, 0x1f, 0x100}, {0x4c10, 0x2, 0x4, 0x400}, {0xf1c, 0x81, 0x9, 0xffffffffffffff36}, {0x7, 0x5, 0x4, 0x2}]}, 0x10) dup2(r0, r2) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000001c0)={[0x6000, 0x0, 0x4000, 0x2], 0x7, 0x20, 0x3}) 17:48:36 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0x1) 17:48:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x600, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x880) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="62d76530f3fbbe3ed859b61ed4006bd8b18b09dcab75b0e646b4d7e6173fbc89a612f48a6da0f67c6d1664e02bdd6fbac5fd5817c5d27844b904c52a3b70e8ae77cbda4d1b789f08849bd924cf971904d9d1b791727f7d5c5954dbe1a52839ab53379117fd446338170cd3588bae34983ae1f7e6c3a16deb57eb2b37aff249c78bc11bd2a21b7a0665e84dc449c5a9ad460f59d480", 0x95) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) [ 311.793590] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:37 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432f5", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x81, 0xfffffffffffffe01}) fsync(r0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xad, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0xe10) 17:48:37 executing program 3: capset(&(0x7f0000000a40)={0x19980330}, &(0x7f0000000a80)) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @loopback}, 0xc) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x0, 0x128, 0x128, 0x128, 0x0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0x100}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) 17:48:37 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffa0008000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 312.125416] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) [ 312.136811] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:37 executing program 3: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="f9c908bf"], &(0x7f0000000700)=0x1) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext, 0x204}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$intptr(0x400, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4080000}, 0xc, &(0x7f0000001e80)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40) bind$inet(r1, &(0x7f0000000400)={0x2, 0x40000002004e25, @rand_addr=0x4}, 0x10) r3 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00010000007e6d0283dd7b982103960e54"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000380)={@remote}, &(0x7f00000003c0)=0x14) r4 = dup2(r1, r1) ioctl$RTC_PLL_SET(r4, 0x401c7012, &(0x7f0000000100)={0x8, 0x1d, 0x0, 0x6, 0x8, 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f00000004c0)={0x3, 0x8001, 0x0, 0x7, 0x2, 0x80000001}) socketpair(0x4, 0x5, 0xc8, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000a00)={r2, @multicast2, @local}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xa8}, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000c00)={r7, @in={{0x2, 0x4e22, @local}}, [0x9, 0xfffffffffffffff8, 0x7, 0x7, 0x0, 0x7fff, 0x400, 0x6, 0x4, 0x6, 0x5, 0x0, 0x8000, 0x80, 0x3]}, &(0x7f00000001c0)=0x100) socket$netlink(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r8 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r8, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x0, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x8001]}, 0x5c) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x4, 0xf, 0x14, "defe28b89526e18dc482548949226c20a97b504ad2e622b4b7c1d70c647c79fa8ea5ae8f72ebb617996f52deee1e0d77f173268d19f9f2284b2f7e81dc291de2", "5fc1ddca6068825f5d00456e64ac94df3c657eb85d71989fd6cd775fde885ce68ed96c0f1cf15858d296550556062b0c9728e6c1cb59c8560be41807dd629460", "231f0e97bd673ebed87ffcd818652876eb8aa0e150a0404214b95deb46f213ed", [0x400, 0x3]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000340)='\x00') r9 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000380)) writev(r9, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 17:48:37 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x220080, 0x42) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @rand_addr, @local}, &(0x7f0000000080)=0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x2, r0}) fsync(r1) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={0x0, r2, 0x9}) [ 312.212567] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a0ffffffff, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:37 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="05"], 0x1) 17:48:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4000000, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:37 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket(0x2, 0x80805, 0x0) r3 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x0, 0xfffffffffffffffd, &(0x7f0000000100), 0xfffffe89) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000000eff4)) socket(0x10, 0x800, 0x3f) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000040)={0x201c}) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000200)={0x7, 0x2, 0xfff, 0xdc, &(0x7f00000002c0)=""/220, 0xeb, &(0x7f00000003c0)=""/235, 0x9, &(0x7f00000001c0)=""/9}) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000140)) fsync(r0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)) 17:48:37 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:37 executing program 3: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="f9c908bf"], &(0x7f0000000700)=0x1) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext, 0x204}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$intptr(0x400, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4080000}, 0xc, &(0x7f0000001e80)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40) bind$inet(r1, &(0x7f0000000400)={0x2, 0x40000002004e25, @rand_addr=0x4}, 0x10) r3 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00010000007e6d0283dd7b982103960e54"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000380)={@remote}, &(0x7f00000003c0)=0x14) r4 = dup2(r1, r1) ioctl$RTC_PLL_SET(r4, 0x401c7012, &(0x7f0000000100)={0x8, 0x1d, 0x0, 0x6, 0x8, 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f00000004c0)={0x3, 0x8001, 0x0, 0x7, 0x2, 0x80000001}) socketpair(0x4, 0x5, 0xc8, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000a00)={r2, @multicast2, @local}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xa8}, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000c00)={r7, @in={{0x2, 0x4e22, @local}}, [0x9, 0xfffffffffffffff8, 0x7, 0x7, 0x0, 0x7fff, 0x400, 0x6, 0x4, 0x6, 0x5, 0x0, 0x8000, 0x80, 0x3]}, &(0x7f00000001c0)=0x100) socket$netlink(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r8 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r8, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x0, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x8001]}, 0x5c) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x4, 0xf, 0x14, "defe28b89526e18dc482548949226c20a97b504ad2e622b4b7c1d70c647c79fa8ea5ae8f72ebb617996f52deee1e0d77f173268d19f9f2284b2f7e81dc291de2", "5fc1ddca6068825f5d00456e64ac94df3c657eb85d71989fd6cd775fde885ce68ed96c0f1cf15858d296550556062b0c9728e6c1cb59c8560be41807dd629460", "231f0e97bd673ebed87ffcd818652876eb8aa0e150a0404214b95deb46f213ed", [0x400, 0x3]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000340)='\x00') r9 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000380)) writev(r9, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 17:48:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x2000)=nil, 0x2000) shmdt(r0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') dup(r1) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) acct(&(0x7f0000000000)='./file0\x00') fsync(r2) 17:48:37 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) fadvise64(r2, 0x0, 0x0, 0x5) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@remote, 0x3a, r3}) 17:48:38 executing program 3: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="f9c908bf"], &(0x7f0000000700)=0x1) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext, 0x204}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$intptr(0x400, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4080000}, 0xc, &(0x7f0000001e80)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="dadcfd938b94bc0175e1268a4ea6e226013a9bec2cdd4430b7a7aa67da0011e7cb05ba0b85e218455e7a7bf1ffea2be81add0000002e4c80000800000000000000003ddf4008e6ecdf2b4e67f7abe86a7fe4fa4f3090ab760ea47ec3155de5dd8c82323a3c327f168c45a91f380e99688a170b981207e96b7bcafa9eae2a024a42e0a22c5e66b0410630ba17b552362a9e229ad5236fc10160a5fa1b48e82155012510d21297bad787b075902ccf6d641724d2ca15ddee0800000039c2f30cc54c319b469ca15dc9cfdeef998fcc89cf3d0810b1111639e011ded34083cb422bc94e1056fe20f28c4f9d20845a35c38a000000cd0000d26bde1b4d6fb272865c4a016bc05670033a0694ce1e182ec7ddb385ac12d9053a5df2a1868163693288a91ebced3cba1bb76533c5d74e84ae"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40) bind$inet(r1, &(0x7f0000000400)={0x2, 0x40000002004e25, @rand_addr=0x4}, 0x10) r3 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00010000007e6d0283dd7b982103960e54"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000380)={@remote}, &(0x7f00000003c0)=0x14) r4 = dup2(r1, r1) ioctl$RTC_PLL_SET(r4, 0x401c7012, &(0x7f0000000100)={0x8, 0x1d, 0x0, 0x6, 0x8, 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f00000004c0)={0x3, 0x8001, 0x0, 0x7, 0x2, 0x80000001}) socketpair(0x4, 0x5, 0xc8, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000a00)={r2, @multicast2, @local}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xa8}, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000c00)={r7, @in={{0x2, 0x4e22, @local}}, [0x9, 0xfffffffffffffff8, 0x7, 0x7, 0x0, 0x7fff, 0x400, 0x6, 0x4, 0x6, 0x5, 0x0, 0x8000, 0x80, 0x3]}, &(0x7f00000001c0)=0x100) socket$netlink(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r8 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r8, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x0, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x8001]}, 0x5c) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x4, 0xf, 0x14, "defe28b89526e18dc482548949226c20a97b504ad2e622b4b7c1d70c647c79fa8ea5ae8f72ebb617996f52deee1e0d77f173268d19f9f2284b2f7e81dc291de2", "5fc1ddca6068825f5d00456e64ac94df3c657eb85d71989fd6cd775fde885ce68ed96c0f1cf15858d296550556062b0c9728e6c1cb59c8560be41807dd629460", "231f0e97bd673ebed87ffcd818652876eb8aa0e150a0404214b95deb46f213ed", [0x400, 0x3]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000340)='\x00') r9 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000380)) writev(r9, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 17:48:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:38 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) fsync(r0) 17:48:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8000a0ffffffff, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:38 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffe, 0x200000000000000) fsync(r0) setsockopt$inet_int(r0, 0x0, 0x1e, &(0x7f0000000000)=0x3ff, 0x4) fcntl$addseals(r0, 0x409, 0x0) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 17:48:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x8}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:38 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f"], 0x1) 17:48:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffeff, 0x10d000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000080)=r4) sendmsg$nfc_llcp(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x27, 0x0, 0x0, 0x0, 0x3ff, 0x6, "f8254e11e4d70e51dcc4bed53fafd62eb25e32ee1b706f84813584cc09688840fbb353b6c392044bb1a6a1e0449cd18e6936ad84fbda040dfcc0cc3dd019b4", 0xf}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000280)="5edbbb6d780ef8ffda1fb64bf06dd4191f73c0c19fd7b9dac9dae2880794e3076fda5b1347a1f72176a8d558563e9c08811c685bb87924659710617224327a38d5df3c0e9af4c30306178a8344d757c479e1e2afd4508accb6cf33afe0e8a619c6058cc2b09b6cccb3b4755c87319025ce319ef1a4a28a9715ad9e2410110990781451b1363209756bdea3af2766c3874a0c791f5c8b50a4975d97185d9d3aaf25de963740e175be41ffb53f9512d4043e6491df6598f74456bb591ecb62", 0xbe}, {&(0x7f0000000340)="1b7622dff6ec225ce1728ef0153ff1dcfb168a1aa5406f932dad9c4c4d79fac54d95d9f20ebeceed6e4a182c606222cc2d1bd1422bf0bdd4c73c3ec6dd1a9461fd7c77206a161bb34063ea96b626309520b568145d4dbdf9aebaa51ae4902562a2e6cd026110de3f1e0f1c1383f855fb8f89cbc373840c540c60dc20cde57a4c422c52c87ddaceeb28a0e32c0a6c865c29537236e23e703ad3ab9e038315265b00d567311d02686adc9eb0861400f6c5a6b5f3d8da2c51019e1f5c0d647bfc9ae0228c54ed66f8dd0dcc6bb6fb239f08de01ff65e065a0fb028b01d4259da25732971b9679100800cb06d78dc7da4e11bcd45efb1a", 0xf5}, {&(0x7f0000000440)="fea2362ce966a5cc0f6f91cb368d37bf7ce505a96476229c47322807cda4d8381439f61ccbd445f156eb0216e82407afeedfee0b013bab49d86535d5d6c36c7eb18fe77cf673fa2239a7007584a6a4cec837ffbb37b07bb71e39759d6f", 0x5d}, {&(0x7f00000004c0)="c1923faf548b65e06c4f68c6464c692d69323cdb9eb19a8eeae3e2805518d471446ac0c2b4633df2cc1ef20170f77fe6581a5d9ced0ab69301ebeab4ff1c8893e95938e982c9ca621797cb812fe11990f01e9b0cd89c34991cc1753febf8cc424d65a6456a1b6fd020bafc94cffca3f9d6f6759ba96dfc18023cda057953fd093f80f19d3134f97e45ec9bf328e36bb78585d0d82ce9178339e16c6b2145c6d8337ae6bf34e0a0549e7f85fa68e7178dd25a2968bc0e34d66b00143455cda3e55da0f616b2f5ef36edf8695b104210b7dbc3615de0521f526b75478d678cbc6446063d8b46b06089df10a6174a95046c34f125", 0xf3}, {&(0x7f00000005c0)="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", 0xfa}], 0x5, &(0x7f0000000740)={0x20, 0x0, 0x2, "c17b24f2030e6a1d0e60f6c7"}, 0x20, 0x400c041}, 0x40000) read(r2, &(0x7f0000367fe4)=""/91, 0x275) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x8002) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x7ff, @local, 0x3}, @in6={0xa, 0x4e21, 0x8, @loopback, 0x3f}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @rand_addr=0x1}, @in6={0xa, 0x4e21, 0x5, @empty, 0xa000000000000000}, @in={0x2, 0x4e23, @multicast1}], 0xb8) 17:48:38 executing program 3: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="f9c908bf"], &(0x7f0000000700)=0x1) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext, 0x204}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$intptr(0x400, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4080000}, 0xc, &(0x7f0000001e80)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40) bind$inet(r1, &(0x7f0000000400)={0x2, 0x40000002004e25, @rand_addr=0x4}, 0x10) r3 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00010000007e6d0283dd7b982103960e54"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000380)={@remote}, &(0x7f00000003c0)=0x14) r4 = dup2(r1, r1) ioctl$RTC_PLL_SET(r4, 0x401c7012, &(0x7f0000000100)={0x8, 0x1d, 0x0, 0x6, 0x8, 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f00000004c0)={0x3, 0x8001, 0x0, 0x7, 0x2, 0x80000001}) socketpair(0x4, 0x5, 0xc8, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000a00)={r2, @multicast2, @local}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xa8}, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000c00)={r7, @in={{0x2, 0x4e22, @local}}, [0x9, 0xfffffffffffffff8, 0x7, 0x7, 0x0, 0x7fff, 0x400, 0x6, 0x4, 0x6, 0x5, 0x0, 0x8000, 0x80, 0x3]}, &(0x7f00000001c0)=0x100) socket$netlink(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r8 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r8, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x0, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x8001]}, 0x5c) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x4, 0xf, 0x14, "defe28b89526e18dc482548949226c20a97b504ad2e622b4b7c1d70c647c79fa8ea5ae8f72ebb617996f52deee1e0d77f173268d19f9f2284b2f7e81dc291de2", "5fc1ddca6068825f5d00456e64ac94df3c657eb85d71989fd6cd775fde885ce68ed96c0f1cf15858d296550556062b0c9728e6c1cb59c8560be41807dd629460", "231f0e97bd673ebed87ffcd818652876eb8aa0e150a0404214b95deb46f213ed", [0x400, 0x3]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000340)='\x00') r9 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000380)) writev(r9, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 17:48:38 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8001) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xffffffffa0010000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "c2d62e5aa34308c57a0810348a9ab53f125632353a368b12a928897524ed3ccc60f71fc75ce78e220ee0f0929b"}, 0x31) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) fsync(r1) 17:48:38 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8000a0ffffffff, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:38 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/91, 0x5b) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 17:48:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x8}, 0x48) r1 = dup(r0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000000)={0x1, 0x401, 0x3ff, 0x7258}) 17:48:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x700000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:38 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x2080) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) connect(r0, &(0x7f0000000040)=@rc={0x1f, {0xffffffffffffffc0, 0x1, 0x1, 0xfffffffffffffffc, 0x400, 0x54}, 0x5}, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x1) 17:48:39 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4001, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000000c0)={0x8, 0x3, {0x54, 0x10, 0x6, {0xfffffffffffffffa, 0x10000}, {0x2, 0x5}, @ramp={0x2, 0x9, {0x982, 0x7f, 0x1, 0x1000000000000}}}, {0x57, 0xa91, 0x0, {0x6, 0x1}, {0x9, 0x1}, @period={0x5f, 0xca, 0x2, 0x3ff, 0xffffffff, {0xffffffff, 0x6, 0x5, 0x5}, 0x9, &(0x7f0000000080)=[0x5, 0x0, 0x7fff, 0x7fff, 0x7, 0xdb, 0x10000, 0x8, 0x8001]}}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r1, 0x1) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0x35) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000140)={{0x0, 0x2}, 0x20}, 0x10) 17:48:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x3000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:39 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4080, 0x0) write$UHID_INPUT2(r2, &(0x7f0000000140)={0xc, 0x1000, "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"}, 0x1006) [ 313.997629] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:48:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x4000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0/file0\x00', 0x4, 0x4, &(0x7f0000000380)=[{&(0x7f00000001c0)="4a037d84cf749c6b51d68d70081d867419079b2cb36ecd1e101949a519f06ebd6f0a329de0aef364aa4ab59037f7e42d6a9a6d98827b1208dee85481bbb15eb86a28b056e1a0dabab2f983e6e281f824200108b23de75db7ca87d547a6529e5543205ae1c315e135a00e9614816d954b46baecb5fa43c9711be57db85be1d77405f08bb5885d23f0a268692be31aab1af7bc69dd36cb593675e3029ca52f39e329912db1c188f79528f301ec2e5871a59ae56a8400f529d927405be8773c130adfd2f26da52b98447053dda5c293f4bcf49b820c1f05afaa89d924d252b91497331ff42cb0510860f7f02bdfed0431", 0xef, 0x6}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f0000000300)="1b8977787b", 0x5, 0x400}, {&(0x7f0000000340)="0a7a599d6b53214de0baa616c8008087efdd0fb3f3bc5300c9a53c570eaed18be519c121", 0x24, 0x7fff}], 0x1001000, &(0x7f0000000400)={[{@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}, {@rodir='rodir'}, {@shortname_win95='shortname=win95'}, {@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}, {@fat=@flush='flush'}, {@utf8='utf8=1'}], [{@permit_directio='permit_directio'}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, 'y\x00'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@measure='measure'}, {@subj_user={'subj_user', 0x3d, 'y\x00'}}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsync(r0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) 17:48:39 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x6000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000004c0)={@loopback, 0x0, 0x0, 0x2, 0x1}, 0x2c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x500, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000003c0)=0x0) ptrace$setsig(0x4203, r4, 0x1, &(0x7f00000002c0)={0x22, 0x9, 0x3, 0x28d3492a}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x3, 0x70, 0x1d5b, 0xffffffffffffffff, 0x40, 0x3, 0x0, 0x2, 0x82082, 0x1, 0x9, 0x2, 0x7, 0x3, 0x9, 0x1, 0x1, 0x3c89, 0x7, 0x9, 0x767, 0x3f, 0x4, 0x3, 0x4, 0xffffffffffffffff, 0x34e, 0x6, 0x1, 0x10001, 0x5, 0x7, 0x7fffffff, 0xfffffffffffffffd, 0x80000000, 0xfffffffffffffffd, 0x682, 0x6, 0x0, 0xb00, 0x3, @perf_bp={&(0x7f00000001c0), 0x3e2fc112ffdc03fa}, 0x2000, 0xa1, 0x7fff, 0x7, 0xffffffffffffffff, 0x20, 0x4}) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f0000000140)={[0x0, 0x0, 0xf000, 0x100000], 0xfffffffeffffffff, 0x8}) read(r1, &(0x7f0000000000)=""/91, 0xffffff59) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000400)={0xb207, 0x1, 0x2, 0x8, &(0x7f0000000280)=[{}]}) 17:48:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:39 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x100) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000001c0)={0x3c5, 0x8}) fallocate(r0, 0x61, 0x77, 0x40ae) rt_sigreturn() ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)="0aa2b0c994b3c11f0316cb6362e4194b54366b2341cbf02d8b8ec4ea9ff75ffddf3a991da84465c169e152335200bf664a5aaf414f856d2bb4cc8069db36dc05928cc1cd3601fb2868f3fafb1979c361484f2eaacdf5ae21fe901d9ede157808405fa169e11e7890cf4460208b10667fd04e24c65538ff626532af3605fd2295e35f53d9274605df0226e652327bc859713168df31be25abc0092d1eabdad77339d4383407a2289696d942ab832af87a69e84b31cbeed81dbab2ce2e685020374db239d227cc5223e0ae6cb7962ea3") ioctl$UI_SET_SWBIT(r0, 0x4004551e, 0x70e000) fcntl$notify(r0, 0x402, 0x1) 17:48:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x600}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x3}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:39 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x0, 0x10}, &(0x7f0000000140)=0x18) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @dev}}, 0x6}}, &(0x7f0000000180)=0xb0) socket$xdp(0x2c, 0x3, 0x0) 17:48:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x1a0ffffffff}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:39 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) fsync(r0) 17:48:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000040), 0x200000, 0x1000, 0x2}, 0x18) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='gid_map\x00') fdatasync(r1) fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "1caa178cea92e1"}, 0x8, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth1Tto_bond\x00', 0x1}) dup3(r1, r0, 0x0) 17:48:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x100000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:40 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743206", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) open_by_handle_at(r0, &(0x7f0000000000)={0x103, 0x89, "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"}, 0x40) 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:40 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x7000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:40 executing program 3: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getrlimit(0x2, &(0x7f0000000080)) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev, [0x0, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r2 = socket$netlink(0x10, 0x3, 0x9) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x15, 0x3, 0x0, "cb2c59e7cb1fe5165a175d2c835efc49"}, 0x15, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000040)={0x200000000000000, 0x0, 0x4, 0x0, 0xc}) 17:48:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743202", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(0xfffffffffffffffd, 0x800, 0x42) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r2, 0x2000, 0xffffffffffffffff, 0x0) read(r3, &(0x7f0000367fe4)=""/91, 0x275) 17:48:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000000)='[{\x00', 0x1) fsync(r0) 17:48:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x700}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:40 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x4, 0x9}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x4, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0xffffffffffffffff}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x8001}}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@subj_role={'subj_role'}}, {@hash='hash'}, {@euid_lt={'euid<', r0}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) [ 315.438611] EXT4-fs: 16 callbacks suppressed [ 315.438622] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xad}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 315.496638] kauditd_printk_skb: 39 callbacks suppressed [ 315.496654] audit: type=1804 audit(1539712120.565:236): pid=11492 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/170/file0" dev="sda1" ino=16750 res=1 17:48:40 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="fe"], 0x1) [ 315.583542] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 315.651928] audit: type=1804 audit(1539712120.605:237): pid=11499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/170/file0" dev="sda1" ino=16750 res=1 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) r2 = fcntl$dupfd(r1, 0x406, r1) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) 17:48:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 315.846783] audit: type=1804 audit(1539712120.915:238): pid=11518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/171/file0" dev="sda1" ino=16548 res=1 [ 315.889967] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 315.959952] audit: type=1804 audit(1539712120.915:239): pid=11522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/171/file0" dev="sda1" ino=16548 res=1 17:48:41 executing program 3: r0 = semget(0x2, 0x7, 0x100) semctl$IPC_RMID(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001400)={0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=""/4096}, 0x18) 17:48:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xffffffffa0008000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000040)='cgroup\x00'}, 0x30) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0xa0001, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x101201) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000001c0)={r3, r4}) r5 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r5) 17:48:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000367fe4)=""/91, 0x275) 17:48:41 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\b'], 0x1) 17:48:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x600000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 316.284578] audit: type=1804 audit(1539712121.355:240): pid=11545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/172/file0" dev="sda1" ino=16756 res=1 17:48:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000040)={0x9, 0x14, [0x3, 0x11, 0xff, 0x9, 0x5]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) [ 316.325698] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:41 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="03"], 0x1) 17:48:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000100)={[0x2, 0x3000, 0x4, 0x5000], 0x6, 0x6, 0xca6}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) fsync(r1) [ 316.380881] audit: type=1804 audit(1539712121.355:241): pid=11551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/172/file0" dev="sda1" ino=16756 res=1 17:48:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 17:48:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xa0008000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 316.442482] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:41 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x2000) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) [ 316.521671] QAT: Invalid ioctl [ 316.531188] audit: type=1804 audit(1539712121.605:242): pid=11572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/173/file0" dev="sda1" ino=16660 res=1 [ 316.567444] QAT: Invalid ioctl 17:48:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:41 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000000)) fsync(r0) [ 316.574777] audit: type=1804 audit(1539712121.605:243): pid=11577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/173/file0" dev="sda1" ino=16660 res=1 17:48:41 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000100)={[0x2, 0x3000, 0x4, 0x5000], 0x6, 0x6, 0xca6}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) fsync(r1) [ 316.654286] audit: type=1804 audit(1539712121.725:244): pid=11581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/174/file0" dev="sda1" ino=16643 res=1 17:48:41 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x300}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 316.775221] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 316.779259] QAT: Invalid ioctl 17:48:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) [ 316.813099] audit: type=1804 audit(1539712121.725:245): pid=11587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/174/file0" dev="sda1" ino=16643 res=1 17:48:41 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x20) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 316.872095] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:42 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x500}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0x87, 0x29, 0x2, {0x400, [{{0x20, 0x1, 0x1}, 0x5, 0x7, 0x7, './file0'}, {{0x1, 0x3, 0x8}, 0x6, 0xffff, 0x7, './file0'}, {{0x6, 0x0, 0x4}, 0x1, 0xefe, 0x7, './file0'}, {{0x31, 0x4, 0x8}, 0x4, 0x8, 0x7, './file0'}]}}, 0x87) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000006e40), 0x0) socketpair(0x2, 0x80000, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000080)={0x3, 0xfffffffffffff000, 0x8, {r3, r4+30000000}, 0x5, 0x7}) 17:48:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffff, 0x420000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x200}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x7fffffff, 0x8}, &(0x7f0000000140)=0x8) 17:48:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x800, 0x104) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller1\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}) fsync(r0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/83) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x6, 0xffffffffffffffe0, &(0x7f00000000c0)={0x81}, 0x8) 17:48:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x6}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(r0, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000440)=0x80) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e21}, 0x10) read(r1, &(0x7f0000367fe4)=""/91, 0x5b) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0xe, "cfcabe88ce6ac94ad8"}, 0xb, 0x0) 17:48:42 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x40c00, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x21, @multicast2, 0x4e20, 0x1, 'wrr\x00', 0x30, 0x8, 0x69}, {@multicast1, 0x4e23, 0x10004, 0x7, 0x8000, 0x8}}, 0x44) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3ff, 0x80000) fsync(r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x2, 0x4, 0xad, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={r2, 0xdb, "850299d2e0bb8f995f7e94961c0a0a5010e8c96c8f3ed9e7c82631c7938e2eed0b3047d14913149f3b1565e7b3bd7c1ba30b85d52cd7fd76cce5c612b9fe2fa381a0c615c7347b708581f0c8a710b7610e3b6b8b28eed14915ab974cadeca726640c0097a38653b5180ca59d71958c2b9123acca8a9f8ee1f67cc38949c19cf13cf80a4c97aa395a67a45ad9dd624d3641c55c7f89bf058723f06b8c3bf57f46fa6ca3b6cfd1826f6e12705fac10b84927dfec27664d66d7fdb98b518e418c53040a523754a99d80c0e526bbd5ff80c3863036f1a6975ae2fb7e54"}, &(0x7f0000000300)=0xe3) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) [ 317.181681] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffff, 0x420000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x200}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x7fffffff, 0x8}, &(0x7f0000000140)=0x8) 17:48:42 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 317.298029] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2+', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fsync(r0) 17:48:42 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000540)) lstat(&(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)) write$P9_RVERSION(r1, &(0x7f0000000840)={0x15, 0x65, 0xffff, 0xca, 0x8, '9P2000.u'}, 0x15) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000640)={0x7, 0x7, 0x3, 0x7, '\x00', 0x3}) r2 = memfd_create(&(0x7f00000003c0)='security}$\x00', 0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007bf4d6de338abff76"], 0x2a) renameat(r2, &(0x7f00000007c0)='./file0/file0\x00', r2, &(0x7f0000000800)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose='cache=loose'}, {@loose='loose'}, {@fscache='fscache'}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}, {@cachetag={'cachetag'}}, {@version_u='version=9p2000.u'}, {@afid={'afid', 0x3d, 0xffff}}]}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x480400, 0x0) ioctl(r1, 0x8, &(0x7f0000000940)="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") open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r3 = msgget$private(0x0, 0x440) msgctl$IPC_RMID(r3, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000001b80)=ANY=[@ANYBLOB="00000000000000000a004e200200000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000d60100000a004e2405000000ff0200000000000000000000000000017f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000a004e21d1060000ff01000000000000000000000000000108000000000000000000000000000000000000000000000000000000000000000000d82953234f422d3abfc72142307667000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22ff070000fe8000000000000000000000000000180010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 17:48:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x2}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x4000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x6, 0x6, 0x6, 0x8, 0x0, 0x7, 0x7, 0x3ef, 0x2, 0x4, 0x60000000000000}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x31) 17:48:42 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x1, 0x4, 0x3, 0x1000, '\x00', 0x1}) [ 317.578108] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x400000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:42 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x1000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:42 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f'], 0x1) 17:48:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x7) 17:48:43 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:43 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000540)) lstat(&(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)) write$P9_RVERSION(r1, &(0x7f0000000840)={0x15, 0x65, 0xffff, 0xca, 0x8, '9P2000.u'}, 0x15) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000640)={0x7, 0x7, 0x3, 0x7, '\x00', 0x3}) r2 = memfd_create(&(0x7f00000003c0)='security}$\x00', 0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007bf4d6de338abff76"], 0x2a) renameat(r2, &(0x7f00000007c0)='./file0/file0\x00', r2, &(0x7f0000000800)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose='cache=loose'}, {@loose='loose'}, {@fscache='fscache'}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}, {@cachetag={'cachetag'}}, {@version_u='version=9p2000.u'}, {@afid={'afid', 0x3d, 0xffff}}]}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x480400, 0x0) ioctl(r1, 0x8, &(0x7f0000000940)="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") open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r3 = msgget$private(0x0, 0x440) msgctl$IPC_RMID(r3, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000001b80)=ANY=[@ANYBLOB="00000000000000000a004e200200000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000d60100000a004e2405000000ff0200000000000000000000000000017f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000a004e21d1060000ff01000000000000000000000000000108000000000000000000000000000000000000000000000000000000000000000000d82953234f422d3abfc72142307667000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22ff070000fe8000000000000000000000000000180010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 17:48:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f00000000c0)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @ib={0x1b, 0x9, 0x2, {"3ab44f0746cd10bb67c5f501a636b44b"}, 0x3, 0xcaa, 0x20}}}, 0x90) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xad000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:43 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x5, {0xffffffffffffffc1, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x6, 0x8, 0x13}}) 17:48:43 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x5}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:43 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:43 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x8) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0x40000) r2 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) poll(&(0x7f0000000100)=[{r0, 0x4000}, {r1, 0x62}, {r2, 0x200}], 0x3, 0x8d08) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f0000000080)={0x0, 0x9, 0x5, &(0x7f0000000000)=0x800}) fsync(r3) r4 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x10000000, 0x10000) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="070000000700bb446def2cde997f35a3641e83884d02f9a7a87c8f597b2c78712c987badb37db34e1aa0bf1fe3296d300b9e3c854f53a2831cd90161b04cdeb637e37a2e071dc1337dbfa14bab6fbdd30b9cac6590e7d3708690aacecf9a07ff00bbcfb0e1ac18ec82dab9cb6131ff129539d4299086a45a1ae2edb9659d0c59dbfbc5ee4d6446421dd85d3b0834f41f9089bc39f949482b2c4371e68489f3e7b30241a6b58e3142dd57b5298565a81c030695acd9a82adba8a0e39d504f4999d465393f1a4739242e254eecafaf8f5c9ccc1f138b593e23bb5762f79e8ffceb3963816ecf7333cfd7353eb8bd86eb193481"]) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000280), 0x10) 17:48:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2-', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x8000a0ffffffff}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000100)="9099f73a1c7a8d070fc9118d5475663b2ed16f0008f441b01fd923c640a21c6619ecb5cf774b4a64549d57962a838f8edd993560a2f848bc483a9d16f602d4739aa45b3d5930d1865232afa712497380f8733173c58546fb224a6dd2e652c54dc25570fce3a59c1ee353a2dcdd719edc15752cee6ea21a24186d1ba23b0b61719b96815f5cbbb9", 0x0) write$P9_RLERRORu(r2, &(0x7f0000000040)={0xe, 0x7, 0x1, {{0x1, ']'}, 0xcf33}}, 0xe) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000680)=""/239) 17:48:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000180)=""/239) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:43 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xa0010000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000240)="9099f73a1c7a8d070fc9118d5475663b2ed16f0008f441b01fd923c640a21c6619ecb5cf774b4a64549d57962a838f8edd993560a2f848bc483a9d16f602d4739aa45b3d5930d1865232afa712497380f8733173c58546fb224a6dd2e652c54dc25570fce3a59c1ee353a2dcdd719edc15752cee6ea21a24186d1ba23b0b61719b96815f5cbbb9", 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x20000, 0x0) write(r2, &(0x7f00000000c0)='\x00\x00\x00\x00i', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x0, &(0x7f0000000dc0)) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000001c0)) 17:48:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r3 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x4, 0x0, 0x800, 0x3ff, 0x0, 0x7fffffff, 0x1, 0x2, 0x1, 0x5, 0x6, 0x1, 0xee4c, 0x7, 0x20, 0x1, 0x1f, 0xfffffffffffffffc, 0xffffffffffffff7f, 0x7, 0x0, 0x1ff, 0x8, 0xfffffffffffffffa, 0x3, 0x1, 0x1, 0x0, 0x3800000000000000, 0x3, 0xefb9, 0x70, 0xffff, 0xffff, 0x0, 0x100, 0x0, 0x200, 0x2, @perf_config_ext={0x1, 0x4}, 0x80, 0xfff, 0x6, 0x1, 0x5, 0x1b, 0x7000000000}, r2, 0x0, r3, 0x9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000367fe4)=""/91, 0x275) 17:48:43 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x4}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x4, 0x0) fsync(r0) 17:48:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000003800)={&(0x7f0000000000)=@pppol2tpv3, 0x80, &(0x7f0000003440)=[{&(0x7f0000000080)="ebddac68ca109f7d9a46f16c84bb702842e6a70ec06c328a90a8bdfab83d0a53bc5852bd4231bdf0882f", 0x2a}], 0x1, &(0x7f0000003500)=ANY=[]}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_UIE_ON(r0, 0x7003) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000080)="ef77cb3218cbb713add2039912a5566125bc732396a056b12f056d7f53b5733f4e"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000300)='gre0\x00') 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r1, 0x80000) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f00000000c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000400)={0x1, 0x7ff, 0xbb}) getsockopt$inet6_udp_int(r4, 0x11, 0x6f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000200)=0x0) r6 = gettid() kcmp(r5, r6, 0x1, r0, r4) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r7}}, 0x18) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x4000000010, 0x0, @in={0x2, 0x4e21}}}, 0x90) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r8, &(0x7f0000367fe4)=""/91, 0x275) 17:48:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x300000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:44 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:48:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x10000) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000040)=ANY=[@ANYBLOB="030000000000000000000000090000000100000003000000010000000001000006000000000000000000000000000000010000c0000000000200000074bb000004000000289d6b42446ea2543c880000000000000000000000000000000f0000800000000001000000f600000001000000070000005f47000000000000000000"]) read(r1, &(0x7f0000367fe4)=""/91, 0x275) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 17:48:44 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:44 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x2b4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) sendfile(r0, r2, 0x0, 0x8000) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x9, 0x4, 0x1}) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 17:48:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x1a0}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x3, {0x2, 0x4e23}, {0x2, 0x4e24, @remote}, {0x2, 0x4e22, @rand_addr=0x5}, 0x14, 0x0, 0x2, 0x8, 0x4, &(0x7f0000000040)='bond_slave_0\x00', 0x5, 0x301f454f, 0x100}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2e, 0x4, 0x0, {0x6, 0x1000, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) 17:48:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x7}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x4000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:44 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:44 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0xf1, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x400000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}], 0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000240)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)}}}], 0x0, 0x0, &(0x7f0000000500)}) 17:48:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) fsync(r0) 17:48:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x5000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 319.851238] binder: undelivered transaction 3, process died. [ 319.890861] binder_alloc: binder_alloc_mmap_handler: 11921 20001000-20004000 already mapped failed -16 17:48:45 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="04"], 0x1) 17:48:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = userfaultfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001d00)) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000100)="9af5cf446d44000fc5dab032889a77f04966baf80cb8f842488fef66bafc0cb079ee0f20c035200000000f22c0b9aa0a0000b848000000ba000000000f3066ba2100ecb805000000b9000000000f01c1b918020000b806a7c364bac7a653380f3066b808018ec0", 0x67}], 0x1, 0x0, &(0x7f0000000200), 0x0) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x10082, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000001b40)={0x0, 0xe9, "2361eb475b3609650eab2fab6f7167dcb69f2897e193cbe0dbdf7e31da148c0a4e9140a0b175e279f1eccdb0baf123caefc0de849406edb9d6c19d77d82623d5ab393be662fc6a3e8f3b813e0e973937a5f8d27b66e391615486d5c71ccb01dc5d8d791f5bb2b71c49cf8265f4c72231dca77ee0f9a3424cb06d80977be6137a90bbb5a40f76f94bcb3125b884575dbd0697610d1c61253fb11b62ee0b22959163d2ecb2dde303cf7ea9e27cbab0cd4058a14e702d1d2684577492a5c3ce3b619488bac61cb04b5f20bdb404a95a943cfdab3914c4cc87ee2b5d6f04d135112ff8f9cd9a3664c1969b"}, &(0x7f0000001c40)=0xf1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000001c80)={r7, 0x9}, &(0x7f0000001cc0)=0x8) syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x2, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="21de2d57abb4de7c7bfe4818c2070369fb5a4d2191e468a9eeae45c5cd8d937f28a3ede0f4eb99fbad00a43e2d27d7f6c162", 0x32, 0xae4}, {&(0x7f00000002c0)="d42c7f3de4c4da5a398c2319db0471e55247ca46a5e1651a8d8631d537a9d9fd9ac4ab398ed73a86420dca423ce27e0e1ad42031439e26c9d26123780fa53e323c90f0b20307817d75141d54ae3e7da4612ddab9a06a4aafe67a1ad6cffc8eb05eb89e050aaf806c0afefde0e2ca8b3be29224d4c2c65f6b43ee98275f0380636348eb376965ef1d6d05c0876a551999ff4cf30234fafc95298b2812377e3b15a97d9c05da5713372592e3b2552335657c4ad59385bc84a7dfc29bae31182aaa0e4c6f60394c22fbe1ca27930486be768d64470d6c460d53a698638e0cd89b1538d5925ca71e16a5838883f8a6d9e8a8463b5c07", 0xf4, 0x4}, {&(0x7f00000003c0)="1fe6c73526ab914767b5641473d9cc503f84f100a81684f800c75cf1f1f88558954e1edacc7ca585b7a43c7964808b18e743ce0ca26f1d71218fb1d34ec00e7696e5d032b58c439a6713406bd945f7407da5cdcdfe55a7f8851a0f3d85842742a200ac9e6cb4ba1777b1cbcbf2473b80204bae13ca0f944dce96146133ba20c26d325969b3a8962374e0ebd9a1ab92900d5af2028b04c3a96f9c0ddaa28a75d648cd2b3b186c9b2b2b", 0xa9, 0x81}, {&(0x7f0000000480)="4b2f8e23c7b4dafeb6b742646b6dae3dd53617a8a4f4af6f1646a7ded5228c995ba74905bf117a3574cc6f56cb2823d1a2bf1d1d2b52ffec29125e7484dbc13998c5dfb7f467be439ad3c104abe9bf7909148cc84b8fd7ad032014396835a5468a40d4bc649fb8e0106241491d873d2a954425d5dbb71adef4b49da5d702d39496379cd47f0e8012f15d0a48e83406968893d92f", 0x94, 0x915}], 0x1, &(0x7f0000001d40)=ANY=[@ANYBLOB="6c6f676273690100e0537463d105426d734abbdf11cabf070db122f961e46e652ae372", @ANYRESDEC=r6, @ANYBLOB=',\x00']) preadv(r2, &(0x7f0000001a40)=[{&(0x7f0000001900)=""/71, 0xfffffffffffffe55}, {&(0x7f0000001980)=""/190, 0xbe}], 0x2, 0x0) fsync(r4) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000001a80)={0x0, 0x2000000000000}, &(0x7f0000001ac0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000001b00)={r8, 0x9, 0x5}, 0x8) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f00000018c0)={0x2, 0x0, &(0x7f0000000740)=""/172, &(0x7f0000000800)=""/138, &(0x7f00000008c0)=""/4096, 0x4}) pread64(r5, &(0x7f0000000080)=""/164, 0xa4, 0x0) [ 319.974005] binder: BINDER_SET_CONTEXT_MGR already set 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x3, 0x101000) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x400500, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x5) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x200) r7 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r6, 0x50, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r7, r6, 0x0, 0x10, &(0x7f00000000c0)='/dev/input/mice\x00', r8}, 0x30) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r6, 0xc05c5340, &(0x7f0000000040)={0xffffffffffff0001, 0x5, 0x800, {}, 0x4, 0x8000}) read(r5, &(0x7f0000367fe4)=""/91, 0x275) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f00000003c0)) poll(&(0x7f0000000400)=[{r4, 0x80}, {r0, 0xa004}, {r2, 0xc}, {r9, 0x20}, {r3, 0x40}, {r1, 0x419}], 0x6, 0x7) ioctl(r6, 0x8, &(0x7f0000000140)="0f7d3c6c786c24c3eee6c9f61b460c29d63e99e529c3992940c5c1a09e688aedb02b6936a1171ed21a8150985853c0b575df15487bbfc4e5a16be16326cd9e78ae169b36255957125d2575b73186f867fbfd399d7e7ee44a8940e217c056226f4836f3ac83cf5c5d44aed6f41e8f48add7607b9023161413660d538007701152f31527297365bea0b3c63c6607eccacc8a02f2a3c770f46174b5e753cae1ac8de1d5ac892c2583629f") 17:48:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x6000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 320.017944] binder: 11921:11922 ioctl 40046207 0 returned -16 [ 320.044867] binder_alloc: 11921: binder_alloc_buf, no vma [ 320.082392] binder: undelivered TRANSACTION_COMPLETE 17:48:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:45 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 320.144724] binder: 11921:11927 transaction failed 29189/-3, size 0-0 line 2973 [ 320.155286] XFS (loop1): unknown mount option [logbsi]. 17:48:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x2000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000000)={'eql\x00\x00\x00\x00\x005\x00', @ifru_flags}) [ 320.264984] XFS (loop1): unknown mount option [logbsi]. 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000000240)="19613d77ac6c3c322d5a9eece177898621f3e6d1317f17d45b6b677fa9db6f230cbc145872974bac633821bc97558b63af12ae9b5aa5f0240597dc6fa1eca8bf0b8fef919e0a9861221f936879b8c12b3d292cdf250970e460115108f27d36a19ccf4e521db1337ee4e765ed5f328a4e76f2a3c035316568cd879c1b8576197e5969665c80da2e0f0402ec20e90c5ab85948273e77eea8226e0471467e8b111864054ad0c3"}}, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000340)="cd8075a0e36969ef69dc00d9908adcd0d01192000880410fd1b0b5d90000797c5e2a0f0fcdaeeae23c3b4d4d408064797f41dfdf400f01efe5e57d0f1c1c0a1a63460fc4c161fccddfde9f") r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(r1, r0, 0x100000000, 0x0) r3 = dup(r0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000000)=0x7) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000140)={0x42, 0xc0a3, 0x4, 0x0, 0x0, [], [], [], 0x7, 0x7109}) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:45 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x125d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "65afba41a7bf89e2ec8fc8c4d4d494c7817e55d29ba3152bf90119ad0217ddad138539deb338811dcee0d21d9730ec1f0f4fe35f40d209f8f67498d9bff4cdea", "579995780104000000000000b41fd1f9ff0700"}) 17:48:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xad00000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x400) [ 320.509735] kauditd_printk_skb: 34 callbacks suppressed [ 320.509751] audit: type=1804 audit(1539712125.585:280): pid=11999 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/192/file0" dev="sda1" ino=16515 res=1 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) 17:48:45 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x200000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 320.588675] audit: type=1804 audit(1539712125.625:281): pid=12008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/192/file0" dev="sda1" ino=16515 res=1 17:48:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x8a000, 0x0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0xfffffffffffffedc) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3, 0x40) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000140)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000080)=ANY=[@ANYBLOB="b441f4a8d38ece9e4a28687d726e13920fdf00000000000000000000000000"], 0x1}}, 0x0) r4 = accept4(r0, 0x0, &(0x7f0000000240), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$unix(r4, &(0x7f0000004580)=[{&(0x7f00000008c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000d00), 0x10f, &(0x7f0000001180)}], 0x4924924924924e7, 0x0) 17:48:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x4) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 320.664263] EXT4-fs: 17 callbacks suppressed [ 320.664275] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 320.689489] audit: type=1804 audit(1539712125.755:282): pid=12020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/193/file0" dev="sda1" ino=16646 res=1 17:48:45 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="12"], 0x1) 17:48:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x500000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 320.771266] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8600, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000040)=""/31) 17:48:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x2}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in={{0x2, 0x4e20, @local}}, 0x10000, 0x7ff, 0x8, 0x101, 0x20}, 0x98) fsync(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f0000000880)=0xc) r4 = getuid() getresgid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) sendmsg$unix(r1, &(0x7f0000000a00)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000600)="04b8f7eafdb22baf2f124532b07bc298e56ae1af0c662c3f6219efcd78d84d699d029fa0e84910959e0ce902d2e28f7a6a5c59732e37709030f477760ef4c3842ab62ce17bd0b73c2fadc8818399d46521f03fda71f6be6a2bcbd587f60849e6257629006b882820f64752737cd2aea53bfe12e899e59d18f7c763de9ee3db7fa24dfeb155c942aa7f8fd2a293052d27b555dbd13f4f9e", 0x97}, {&(0x7f00000006c0)="34b78814b7d433d4a38e572281770f46020c2412a9a7adb4f833259bc0de22e40f9f3d641ee12566a2a52af973de682fbbf1e0e0e43e230623108dd982958529ee826e453d8a8d993442e6fbbd33d88385c272149d0577280e4fd2d27bbb47a182791926157de756150a1158d0001886d189cf6ab9ade553e2d1c387872410dfd5aaeeeb88f43fe0b7b4226e7661d3e54872d3a1d62a85735013eaa42921603eb35a11354569a08badcb5dc9c4ed1b8bd86a81081a67e7e208de3555ea63c4f029f522f0b96641cdf062fa3fa74c950f36dc4b42bd2824", 0xd7}, {&(0x7f00000003c0)="daf8c1265ec86dc5918f60545f859568c55e34b6afefa4", 0x17}, {&(0x7f00000007c0)="03421a43281ef3ae7eff873362b085d55c2ea6b1413d89bcc193c9335664d94a6582c4f759c9ba0ed9398e0283c623911602c1c4d276edac3133bb2bbbd7afbb2a0f525c9b10351d5cb9e1885ecd58e5645d727666790bffd5aa5bbc1a88532ffd8171664c474c64c03803bfef1314bc044b6549408eaf8cb6adaf85f0db7565ba184ca0cd319aecf1811327eaf7be404d672fa76f", 0x95}], 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="200001000000000001a0000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x89bfbc637fd2474b}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) mq_timedreceive(r1, &(0x7f0000000500)=""/201, 0xc9, 0x9, &(0x7f00000004c0)={r7, r8+10000000}) recvfrom(r6, &(0x7f0000000040)=""/48, 0x30, 0x2000, &(0x7f0000000080)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80) [ 320.823752] audit: type=1804 audit(1539712125.755:283): pid=12022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/193/file0" dev="sda1" ino=16646 res=1 17:48:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:46 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000180)={0x5, 0xef85}) splice(r0, &(0x7f00000000c0), r0, &(0x7f0000000100), 0x4, 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket(0xa, 0x1, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40}) socket$inet6(0xa, 0x3, 0xfffffffffffffffe) getsockopt$inet6_int(r2, 0x6, 0x1f, &(0x7f0000000040), &(0x7f0000013000)=0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x3}) close(r0) 17:48:46 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) [ 320.966202] audit: type=1804 audit(1539712125.995:284): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/194/file0" dev="sda1" ino=16548 res=1 17:48:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsync(r0) 17:48:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x8000a0}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/uts\x00') read(r1, &(0x7f0000367fe4)=""/91, 0x275) [ 321.057486] audit: type=1804 audit(1539712125.995:285): pid=12048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/194/file0" dev="sda1" ino=16548 res=1 17:48:46 executing program 3: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)='\v', 0x1}], 0x1}, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000280)={{0xcbd, 0x6}, 'port1\x00', 0x0, 0x2, 0x0, 0x400, 0x3, 0x1ff, 0x4, 0x0, 0x2, 0x1}) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x1) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) [ 321.128743] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x280000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000001c0)={0xffffffffffffff9a, 0x0, &(0x7f0000000100)}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0xb2, 0x2, 0x20, &(0x7f0000c00000/0x400000)=nil, 0x2}) fsync(r2) [ 321.189951] audit: type=1804 audit(1539712126.205:286): pid=12062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/195/file0" dev="sda1" ino=16550 res=1 17:48:46 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xad00}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 321.264284] QAT: Invalid ioctl [ 321.275633] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 321.301938] QAT: Invalid ioctl 17:48:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000080)=""/91, 0xffffffffffffff4b) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80100, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000180)={0x421}, 0x2) [ 321.318800] audit: type=1804 audit(1539712126.205:287): pid=12071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/195/file0" dev="sda1" ino=16550 res=1 17:48:46 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:48:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x700000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:46 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd, 0x0) fsync(r0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xe4, 0x29, 0x2, {0x100, [{{0x80, 0x4, 0x5}, 0x7a, 0xf967, 0x7, './file0'}, {{0x8, 0x1, 0x7}, 0x6, 0xae8, 0x7, './file0'}, {{0x84, 0x1, 0x8}, 0x5, 0x100, 0x7, './file0'}, {{0x0, 0x2, 0x3}, 0x0, 0x5, 0x7, './file0'}, {{0x84, 0x3, 0x4}, 0x80, 0x8, 0x7, './file0'}, {{0x4, 0x0, 0x7}, 0x3, 0xfffffffffffffffd, 0x7, './file0'}, {{0x10, 0x0, 0x4}, 0x0, 0x1, 0x7, './file0'}]}}, 0xe4) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000280)=0x6, 0x3, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0)="5ab1cf19cbd7a27f716d52b8fc67b8c70e838e83179c58c6a427d609e5937f3dc05baea3c6c6524854299bec05313dd94541c8e46b2e4ffad5f99be71428079d65357b156497a810857203b0908e188615f94bb511c5f9d9c97e88d79e6a3f8852efaef7af508bc232cf7bd764a3890cee9ee7a3dc75ed8aa9565e85568d64230af08391e7bc8ab9011001255af9d90eb09ed645d6d703c07b4c0e4986f2db94bcfc957b06902a4b55651005d2bc13098d99eea6078ff82797d7963b73ca904174199f9b97f0bfcd551084", &(0x7f00000001c0)=""/159}, 0x18) [ 321.428489] audit: type=1804 audit(1539712126.395:288): pid=12087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/196/file0" dev="sda1" ino=16526 res=1 17:48:46 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x0, &(0x7f0000c87000/0x2000)=nil) getpid() r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$inet_sctp(0x2, 0x10000003, 0x84, &(0x7f0000001a00)={0xffffffffffffffff}) socketpair$inet(0x2, 0xe, 0xfffffffffffffffd, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getuid() r6 = eventfd(0x5) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001740)={0x6, 0xffffffffffffffff}) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001780)='/dev/ppp\x00', 0x0, 0x0) r9 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = accept$unix(0xffffffffffffff9c, &(0x7f0000001800), &(0x7f0000001880)=0x6e) r13 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r14 = openat$ppp(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/ppp\x00', 0x103000, 0x0) r15 = open$dir(&(0x7f0000001900)='./file0\x00', 0x200, 0x101) sendmsg$netlink(r1, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x10024001}, 0xc, &(0x7f0000001700)=[{&(0x7f00000001c0)={0x20, 0x42, 0x4, 0x70bd28, 0x25dfdbfe, "", [@typed={0x8, 0x19, @u32=0x10001}, @typed={0x8, 0x7f, @uid=r2}]}, 0x20}, {&(0x7f0000000280)={0x1474, 0x3e, 0x1, 0x70bd27, 0x25dfdbfe, "", [@nested={0x80, 0x4b, [@generic="c47286b58edf226aae5f0481a24289a06fbe6a47cb6f86d461d76d7d91164824b67b3cf0a00bdcdc1607754885cce338be4805e759436625544f2a95f5a09fc64f4f416e2670a1573d5900bb7c226ce5b87dd904345119535370344e937d9076c923b973621f94e1313f9b5f0254dd1a5ed4bc3bee32475f84597104"]}, @typed={0x8, 0x6b, @fd=r3}, @nested={0x1144, 0x6d, [@typed={0x1004, 0x88, @binary="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"}, @generic="4542e32f0149b64124c02fa7e927c70b5419528a1815b78bfc8b0de7c1b91c4b3e5d2621beae244383bbf02b5e97606078f5c98280f310765f973451bfdca42d3c764a6a58d9f13271643da185d0", @generic="16a0a8f6d72cddad3c75fe421116dd148b0a307c51c0925a683596d0b1c000ad6751cbb2721edf16d25af0628759ba6b4b15e51536698565cbe00e5429fe80faf6b2e4983733f048c482d8bb128678131bbec2f953b69eab3a1aa424570e04133efb27f8572e5645240b9a1bdb8fec9eb564c01009c396f725f04d24a6616c747d271adfb9e799e6d70bbe67c2211b3316ab0ee9e2cb124b365c3c088a6308a02eee51e109d9fe659b896c1ef2b37ffdb31143a381b1cc1cf0e27c78e5b77082cb5ca33d2712db5217ccc66dd6c1bc37a2ed37c2ee8fbca8ce7aee65f624960489e7d79340c6d82f5c40c62c"]}, @nested={0xbc, 0x7e, [@typed={0x14, 0x57, @ipv6=@dev={0xfe, 0x80, [], 0x21}}, @generic="1fed041e9c2199449bb463e6905c30bfc54ff494c4cd47473d277f6d027eab505c6106459da85939b68e123f9c39dc0160212ed77659902d5785a807e8991165e6a7880decc2a994cebb13697f0759706e00248be71521df1e224e773ca3756273c14d5ecb2137b0bb5a5ab5259d2ede1894fecbc84c6ec06c2dd8c43683502262a4e1470cc7cfecde9aa0487c74ce31dea63238d0a77f9e8cf9999b526802247841"]}, @typed={0xc, 0x64, @u64=0xffffffff}, @typed={0x14, 0x8e, @ipv6=@ipv4={[], [], @multicast2}}, @nested={0x178, 0x8d, [@generic="6cffd8e31025a057524b74a170e1ad5618dba063e0c0c4dc1f1f7521ce23e49572ff410198485d97e2a694d17f97227d6d9bdc669d59486de146b6222afcd48b7d720b0df6cae7f85938eeacb25a533f60729e44f278e19a33f1ebee06f5616a03", @generic="09e7bdc27e3b662bda2dc60471d6d18a9cdd044e6b4ec0c3e80648b8196c253a9736289774238d6ba06bfa98c0a6f5059b8185de3817f1469d30dfb4a9df7139451434c2fbc51decea22da3971887f8e9165724e6916de3184f6d6b33d8f1792a54c6024dc3ebeab6823118ae80dfe4d8944641f45538e6979f1439845d66c0c267b8746c5f94707d3bfee22db65d6b672ede79701f22d4b2b8ff8c10607629c1d974ec98da0cc261d", @typed={0x8, 0xd, @fd=r4}, @typed={0x4, 0x4d}, @typed={0x5c, 0x6a, @binary="df8210b9efaca25a60510fafdd943ed27bcc8ca330fc26256fa0e90fe82fec8da9e89c779ebcd8c28246bb399a5f69b9d66da7baef705648240f74ac2f935eaac3bb7a07215d7674e0315ffa948078c85a843b473496bcd2"}]}, @typed={0x8, 0x94, @uid=r5}, @generic="83c4b04cb7278ac195a71a7a5fa31f57a3783419d6aa6580eeb2934ac5c2a60b890a9fde9bd6a07c784dd46d119fe8527924367b0aef666ebc"]}, 0x1474}], 0x2, &(0x7f0000001940)=[@rights={0x38, 0x1, 0x1, [r6, r7, r8, r9, r10, r11, r12, r13, r14, r15]}], 0x38, 0x20000000}, 0x0) 17:48:46 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 321.536078] audit: type=1804 audit(1539712126.395:289): pid=12097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/196/file0" dev="sda1" ino=16526 res=1 17:48:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040)={0x2, 0x3a52}, 0x2) fsync(r0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) 17:48:46 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='\x00', r0}, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xad00000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0046a76d1e000000"], 0x8) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="080426bd7000ffdbdf250c00000014000300001f000000000000080007004e2400000800050005000000"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) r4 = dup(r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x30, 0x8001}, &(0x7f0000000040)=0x18) connect$pptp(r1, &(0x7f0000000380)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000180)={0x6, 0x2, 0x3ff, 0x3bcc, r5}, 0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) [ 321.720195] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:46 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x7) 17:48:46 executing program 1: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x2000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 321.879921] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743205", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:48:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x34) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x3, 0xeb, 0x5, 0x73d, 0x1}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x1, 0x4, [0x66, 0xffff, 0x8, 0x2]}, &(0x7f0000000180)=0x10) 17:48:47 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfffffffffffffff0) 17:48:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xad000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:47 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0xee) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x10000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r1, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x6, 0x0, 0x1, 0x7}}, 0x20) read(r2, &(0x7f00000000c0)=""/91, 0x5b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000140)=0x1, 0x4) 17:48:47 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x3) 17:48:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="eb2c906d6b6673ff666174000404010a02000274f1f8", 0xc0, 0x404}], 0x0, &(0x7f0000000a40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="a4a081baa9545154a1331a62aeed21f8eda35c904b7a36b5bad1576855e754980f9634aa151b482214f21a4fada4fb1250eafa6b2560fdd3512e3d50cf06185505f00da3797787bb37438c37dd861a57a674df67da07db6edd4ce2ef3a97db5eb9344b5604e53348fbddaf6c1b7e4f3af6c8321cac3982683b23bc9e6b71bca9af77c3e36d7110669a9cc9610a070328b3e2b9b10aa397e4d037c40ce011f7a7e56c92a5e8d9ad25a09fff5cdbb13db76a8c243d352fef5d970044a5efb90ab44eaf68df068e8ccf10475b298a4eb0a7383bfb314d09676c359b2675c791db4500c95e53dd33cb6afebe72a5b2"], @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRES64=r1, @ANYBLOB="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", @ANYPTR64, @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYRES16=r0, @ANYRES32=r1], @ANYRESHEX=r1, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRES64=r0, @ANYRESHEX=r1], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYPTR, @ANYRES32=r0, @ANYBLOB="f0d9f8fdb65558591f6da8ee4849e45c2e0c9f11a61741b968f5c4622e5ebbd5d2d4568bc25e62436860f27533af05fe01994509fb24979a65095bc47a76d2f93c204afa74c040e59ca05bccdfa157a16e09cdb258c822e5b4ed122f537d6b46e89269abe0d4f6ce396438414cd4a4d3cc2bf40bf8a7fdec354dcdbad723f1fa6780778be67f64c3df87daedd3cf6565e1557865418e6a34b22bf7e7e5062240"], @ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRES32=r1, @ANYRES16=r1, @ANYBLOB="93f0ef4f9771e6dec756c833d1fea4773a7c6709a384f1fed7c760e407fbc9f1ccbc26b57e69eea711ae8fed84daa4a31467d757e41e2e8601b00bacccfefbead3db859f828ba58d20ef32ec6035322cdd783ef65e80eca27f65c4d7995b85f8eb7b36d9c15b0a338b25896c6661eefb28383b725b99c2f85d8f666545", @ANYRES32, @ANYRES32=r1, @ANYRESHEX, @ANYRES32=r1]], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYPTR64=&(0x7f0000000940)=ANY=[@ANYBLOB="90bf62f4ca4d722f019e0475593fec4ffe29817a050e0da0f56661bd92073d2ad139492ada95ebe6a25e0659fd7ff3df7f1db19873d9507335a45ef93ebcb1a6c6aee1dde33e1958bf98a88151e44f65da0f13f08de8d723fc7996720cfa3432ee6425a687f3a259e0c869111b4d3502c19507c7345b53810bd9541ae694715ccc141fe472f1a00b936e222c40f517d46951c332c9cee88bed1dede3b86c8a0db9c4878b9b734b1cdf524cdc005aa4497fb5b5dd202e2f74fb33a2f3e0ecefba23672fcc68ab6a3439093651b51c1e93", @ANYRES32=r1, @ANYPTR], @ANYRES32=r1, @ANYRES16=0x0, @ANYRES16=r0, @ANYRESOCT=r1, @ANYRES16=0x0], @ANYRESOCT=r0]) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r3) fremovexattr(0xffffffffffffffff, &(0x7f0000000640)=@known='trusted.overlay.impure\x00') getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000480)={@multicast2}, &(0x7f00000004c0)=0xc) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000440)=0xffffffffffffffff) [ 322.213398] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x600}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup(r0) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000000)={0x3, 0x3a}) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000000)) open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x1d1) fsync(r0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)={0x7, {{0xa, 0x4e23, 0xfffffffffffffff8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}, 0x3}}, 0x1, 0x1, [{{0xa, 0x4e22, 0x4, @local, 0x7fff}}]}, 0x110) [ 322.331462] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 322.358937] mmap: syz-executor3 (12205) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 17:48:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:47 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x5) 17:48:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x6}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000367fe4)=""/91, 0x275) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e22, 0x0, @loopback, 0x1}, {0xa, 0x4e20, 0x2, @remote, 0xffffffffffff7fff}, 0xc4d, [0xa25, 0x9, 0x0, 0x4, 0x0, 0x400, 0x8001, 0xffffffff]}, 0x5c) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffff8ba6e030, 0x88000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) write$P9_RLCREATE(r2, &(0x7f00000000c0)={0x18, 0xf, 0x1, {{0x79, 0x2, 0x5}}}, 0x18) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="2c0000000400000ea24b7400080000ffffffffffff040000000000000000000000"], 0x2c) 17:48:47 executing program 1: r0 = open(&(0x7f00000002c0)='./file0/file0\x00', 0x6000, 0x70) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000380)={0x200, @time, 0x3, {0x3, 0x3}, 0x86a, 0x1, 0x9}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400400, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/193, 0xc1, 0x40000000, &(0x7f0000000280)={0xa, 0x4e20, 0x160, @local, 0xa69}, 0x1c) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5, 0x22c0) getsockopt$inet_tcp_int(r3, 0x6, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fadvise64(r1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x5) r4 = open(&(0x7f0000000040)='./file0\x00', 0x7050c2, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0xb44) fsync(r4) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) 17:48:47 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x4) 17:48:47 executing program 2: socketpair$unix(0x1, 0x100001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x4, 0x3, 0x1, 0x2}}, 0x26) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) [ 322.582739] FAT-fs (loop3): Unrecognized mount option "0xffffffffffffffff00000000000000000000000" or missing value [ 322.603299] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x8000a0ffffffff}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 322.717946] FAT-fs (loop3): Unrecognized mount option "0xffffffffffffffff00000000000000000000000" or missing value [ 322.726227] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743205", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x60000, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x7000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:47 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x2) 17:48:48 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000200)) flock(r0, 0x4) r5 = getpid() r6 = getpid() ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000000c0)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000006340)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000007140)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000007240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000007280)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000007380)=0xe8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000073c0)=0x0) lstat(&(0x7f0000007400)='./file0\x00', &(0x7f0000007440)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000074c0)=0x0) fstat(r3, &(0x7f0000007500)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000007d40)=0x0) r18 = getpid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000007d80)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000007e80)=0xe8) r20 = gettid() stat(&(0x7f0000008380)='./file0\x00', &(0x7f00000083c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000008440)={0x0, 0x0, 0x0}, &(0x7f0000008480)=0xc) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000084c0)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000008500)={0x0, 0x0}, &(0x7f0000008540)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000008580)={0x0, 0x0, 0x0}, &(0x7f00000085c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000008600)={0x0}, &(0x7f0000008640)=0xc) lstat(&(0x7f0000008680)='./file0\x00', &(0x7f00000086c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000008740)='./file0\x00', &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r29 = getpid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000008800)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000008900)=0xe8) r31 = getegid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000008940)=0x0) r33 = geteuid() r34 = getegid() r35 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000008980)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000008a80)=0xe8) getresgid(&(0x7f0000008ac0), &(0x7f0000008b00), &(0x7f0000008b40)=0x0) sendmsg$netlink(r4, &(0x7f0000008c80)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc, &(0x7f00000082c0)=[{&(0x7f0000000240)={0x384, 0x17, 0x10, 0x70bd2d, 0x25dfdbfd, "", [@generic="04786067e214009ecd5a25490a688579418cf780a2f0a17b71b73178613b9ddf023ad3e2719f9c954ee57d9183abc030d74caf2c47cfea983b40e9dcc35e5459e9bf3bde09e47b00d57dfcacb05cde81530e7d4f92abfa5440030b1156d83c53cbde990973c4c68a7afe1530d7687a57be32ac528917c3e441285a11bef4de6acdaceb15deaa0ce2b5a701e2dfd1c609dbadcb1e85cd1c380dc236f2eb8a0035faf6b50598e3cff05d0e46ca6d3ae97a134a8f789e860c8fbf957f8e578d218134c0c3cc18132c9310d16c4db7", @generic="e631b662aed559ead2556879266575ce8ac0ca45914022ea8f64e90336a0bd58cd81ad0b7f80cb2752e571725cfec756626cc2eb31948275921538a6fa68e9270203e076eb6c62a201803fe13c5e5e586ec53218691929de29f7763b6ba7ddea5ba7cd420595218ccf9c346a272fb1945d1ac21ac32e2314a92f37f61bbd81f9d6c85a57d1988fe70336b1af34b8f568b8a332db69e6374f9b354456c4b0bc3022d525641f333ccc5de5bd8a268e8ff067b393d07ce276dd8704f8ea938ce58213d2d4d25c15b362ff293289633e7c029315b131f75e44f6e509a4b66cebd4d88a1f", @generic="50cb6a5d5d6b243b8d1ad6762d03eb781fea4a132c4eac19140cb5abc5f4c630d8d182cabe708e83277915da9fd054ab75a20ddb7b6d1268a22fcc2a99ef36962fcf", @generic="9371ed9aa48eda70eea599b3efa6", @typed={0x8, 0x44, @fd=r4}, @generic="ac77fb793afb32802b8422d3bd5b3d4f848c1a9bdada8b5da0dd37dbd3006b68e74d7e3412b1f316c307f84764d13187c4b9f3c2", @typed={0xc, 0x58, @u64=0x69}, @nested={0x12c, 0x6f, [@generic="287fbb17b93237f4af23d4cc0a62a806ccada5926290bf6bf5b79703bcc88ab1da764135e6bf663d17e0da9f667ab11d70e0bc48e8e6cf414fb1ddb6d81688dffbd5", @generic="c0d010106544dcf2b384f9f01afa8fa93fa0b7232804e708db4669728d438cb5e5d80823808c033c042b726d3e0da1f77fd96196dad2713dba862acca04f5f4a30", @generic="be5622c8aeb0d0126d599d69d82ac2e09e881965202cbb74d901acd714b8d86ae98d2ca542af3bfffb27c3a8aca3d22c8f42805ec7bd4868c7f138fa6212b6d9366b30973a56e183140040012c2a9e022065408e5277b268384851b06e9089a552e352fdaf179e643440fbd29576e648504ae03aee48e9a56c9d6f9e748d8a51ae1ba9ce7338de8109bc197612a1fc26c88deef6e88ba07d07194d704deb673838bd2c2549"]}]}, 0x384}, {&(0x7f0000000600)={0x43a0, 0x15, 0x110, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x8, 0x55, @u32=0x5}, @nested={0xb0, 0x6b, [@typed={0x8, 0x5d, @u32=0x10001}, @generic="f3fc6e7a198b306b58d19a877992ac356937e8259fb9b05c56038edc4cc36a75d7b6b566be93b974c9da45724162495302e0d8e5d07d8a2799158ec6ad8ae6db5661ac16f056dc8aac143cd05e5868c6f3c01a52e1927bb8f64b18b1103cb1862de2e0d3a416d24f967da36fcd56c38e39b694103c808646da25e2f53f4901774bec9642a32f836e9bbb6b69e4ff3911b5837e8db2eac223a19f1e9b", @typed={0x8, 0x57, @str='\x00'}]}, @nested={0x74, 0x43, [@generic="34f5d54467c0b22efb2f11784532cb0a6945f1de3c590be34fdd846000819a4bea1dbf97e9ea85", @generic="055152f4c6d91353aca402423e4cc3c4ce129e279717b9d88cbc491a67e3da423b0b44572d748b05ffad8714a168329b9082e3646c779363e92b37fc1127a1b98056bbe15d131f10"]}, @generic="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", @nested={0x3264, 0x3, [@generic="85f8203621d09c18267c3ac74710d68939012801bdc1649daf9c68b893ccd588655f9a77d5f7b60ebac0e1cc92a2b54215e09c639b63ee6cb4dfb309eadd3fe6f5d9aaa4cd8881c2ed1b57b99f6939191cd6cf388ef6069a20aaeeea61df268fe1caa4eb6d488c682564c4295b8ae679480d6bf159b1be74e186b77432ab485bf64d7424f095a327c1f944864305ffefd8e617d6882a15bc3422563dec3dae67b791255618caae5d5215efd8c2d93e388bcde637fceb3704a9a24f4c75826c9f62bab5726a597321490521aeb1a74c8fa03e3e4afcf667493b355c96562df7f835037d84a135e8", @generic="507219d05371b5a43dba082543ef13973b589e4fac77fb53ba1025df420f92e048ec252b3f8392f401ddac3daa351e570dd75883deb284e86c8c3a4ea3c30cdb137e5796a9b710d42a58defb2f57d24ee7cea1b2e13c297f63dc6f0b8d30aadc33bf0874ceff425bd7e903", @generic="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", @generic="10186770a627c227a373cad2c3758caaa157c36bb6024c2596af4a69a37a48dd565c233c4a28348419f71e634b88c307ea54c077767e67c9a352d0bc08a07aa9581d7b4416363b2ab7db261a6cc66d984e6d87b0e8e3e3475d8fe6a83fb4e89d06185e844df3880af074ba6d16dbc7cb1b8cb1077e136c4ede79ae81b70175c47da23951f6c1be81c49f5141677bc1ba6a7a19c243f29753be2d5da804b5ddbed7f688d7e7c441e54381b8b526c51ddc5dcb29a69ced4d79cacf107d815c8111a966f4fb34b8d07cbdb6b7e1e7364efaf7eec5d14fc23d37379077ffc0ede8d52197a889302e859b5354300b19d1e14f1856708c66815ddc2f59f333b944e34dbf9e12286a6a4e94c63eb23836c3dfb5ffdc8501bf949d8ec5f6937239ec346528747c865ebf0379d586d7252b6d1ac9d5525b8ced198e5771868981c3b79fd126f90305d197718c4b6f21dac88ab14f978ac382bee1d582cbe026fed6429e9b98343a02f538e07627b338875bc2a8403bec4434567b3f2ef77fe73016d82e0b6c4560d7268d9d79f4f8c7e92023a217fa0a5ee562f560436cc047ba7576f5a6bda23e0567011e49a154dd840d96641b189bcf520cb92ac25959e77cd0c0e53530d5762a6313420f2a115e97fa2e41fd6b982196d42e32e8b0115b517e102f6a31627e1308e70d5b82ad5a7df806a296cf71d35c7cbd23d05aff0b5195d678a12be842e002053be76c8aba18203babf1160b20a1fbdb282679029a6cf6fc85b42c8a87c3c1dcb412c37f435e859d250ef3fca0107818b3444d113b014ef411674df06def6dbc8730d4780b5c7525248156d1a05e5c5cdce31281389a34874cc268fefa6aa9810879f696b3e97462ed40f25c9ff105425d7625711cdc02a39fff9c5e288e5c8b00592515e233b8dae0185f2cbdd6568e5640cbc5b4cf899bcdfb35764e741b9e20181e93dab481e20f4414455326e84b497cd887fd1c39f6336a34761f1d4594c41b3613c7fe58978b01c1e2dcf43dcf612088d89216996ff2bfa0a4e9185793aff7880153c3cc3fca99e44b25c2069f3acc88e0555e33d5c47a8c5849bb21bea2675213b43116b3b2d66d558edfce4f7e05b67d073c74a14d54580a065459cc58e5dd30e382a245f67da2f15cd685ff14eca33a7f044c6d7346a69c85d13ffeb306987e1c54d2304329bebe7dd370ca99b689c8abc4a15872e31f68f90bc9abf0a222c4ba6e5e143d4c9eed00b9fe4710cd6f8908edd6a8c715b56fe3feb108bb33fdfc9748491d6d7451f8eb15a7ebe372e0af97a6ea57ac061263328f6ec71aa1b0ed9f7c5a3aea6485f8f80d56f121ecf94591b0f71f7ea7784f48495fc9c27030100f58dee2376f5678ab769885c3bb9b1e44ddd686a3f74721b90381db4956184fc2b3393b87ecc9ff894c0db8d71bb7d0bcc83ac2e6883c23508dc425e9db20656463f597f1dd155baa55744b80fbc0398f85f2fbe8e2abe380f1f2105fa8161515016ab59fb8ed7aa1db828cb408f639816192d1af28e0210564be935a979afeb8770aee0342b879f9018e63ce0d06a3cfb22b4bd26f11009e7fd9abb2064044e0cc004c4a89ef4009f5e7f2d26aa4bc30b16be4c969d625b0c296b35ad34db3e88e8afcb7bb11557f5b16644c094438fde63c5b84ba65bfe858d22f1bb7eaeb0b0ccb0ed902d7b3c28feb4aab2c23e888d403a6fc52638062a18e5e6b1782ac2f0513e45f710418404d8bbd3fe7e24ded12fc7ee1d4ce7f07080199dfe8d17e51fcb7b69f032404f70f91d81b151bcc1e4b4e0636bc621874a5eb2ed0f5af91843dab4906facd904a39d80da1c1631d829e59290225533479f0ea3967b70f8837e71d7efca9c588d7bec15330e881a92bae715c753f5cd692f86e31833d0a4afc4ea15c6b947305e40b04f85fe377ef5deb4dcf68909a01341abf31ca2020bbd5e565dd213fc5a0e06dcf57b169834781556d4da1a294f59463c13fd7af9a873ed3f662626b5b33fc36c1ab9ffd0ecdb734fbfe435d589726bf59c96be587618dd01680844378e29358236be5a57f95b0ad653ef2f86bd1bf8c3adceccdf1dd57e7e840f29b40643a61e99f2cdba08b9a05addaf915e0e717f25546f13de47995372f69f233ccb995aff3e40bbf9869243b5463bcb266569366d7ac7acb02bb487986396bbcb55a25ca960c1ac93b40427c5d29f17f4916d9aa029a7ed2d2737660819098599effaa1276adf503d553650d6ec07543cb7f8b59990baa4937435d64eaf8493e3ee623a0b0454d3a0dc712361187e4a8b8c492a831edd48049dc5252833eac7eec4557a965402d8b5ab040c8e14dc0cc224591d27d2e00c77e9849eb0b0d068e1c35d116f07648cee81ce9d1a5a68b428d6097bbca1c4239fbc644c123ff40fbd65198b52228d771885614b81ce8f0964317616c04d57126ea6061b0f9afc7e13975c7a67e0c46918a228ec2cbb1a9c9c1f126d11443727a8e8919250164960b6a60432d56a2503575e260d192b42458f2b51267de0f9cf5aba475f04a2d66946528e57fb082d99db48b8f4b1f838ccf3c18fcb42802239d766a465660bd9af5988a6365674182601fbf8572df626467d9a607acab5596c78126501cc40dc39a48c38f1d31b520c615568fab6b21b5ab56b28b0ece813bfccc9205bd7f1881b23803fd6bb6d2ae389dcb7aac7b8664ffb3653641e3cdf73c1391985d46def78555fa035326ae168171a947ba48804c6265af2d3f4873b35319e56b8a2d103bff47726c9bb42affba2958b291908b8fdbfc0b6b58e7ed49f82c5e3c79963d28b536248530c3b53ef56e6bb5cffe9a525bd7cdd889e656bce118c9f585252d1d05fcbe28e87cb340814745bd152344c1efa2911f9df7c187d89702b2765216f79d3a850e35d3c4b51b8b5b51db2e3c26d16624b5205b9d50ca7a0b72788c121ecc337779e65355ddc4281070f43059d27addaf7cb9ab587f66dab4f6b4dcd29631216e55fa91b6152f30a662a48081c02af0dc2966c9ac8123815ecf15e5d7dd6b067c7d221be94a763d0f0e63e77098cbc812adff0634a581ab142cfb3c14e002ff5e77adefd9d0cd90799f071ebc21c304e1539d5ed1f74ec5ce0e31b391be8b49884fde8596aec11b2b1b7c1212b9f3c3da1a9d8988aa48967cab36d03c0a7c2153b5d1981479a3a96c261dc7570a4bfbc8f7025fc37dbc8db757c0dc04286f90a8e4c9ff2e25a5fe029a9a2cb070ab659379f204bfed3c488c07e014634098403b4741c6cf32102fabbacf5f42ad3bb59cf1120b45ea9f7bed0c4a8bf51e5f462ecb332da22edaed09ce3d2a36dbdfbd59488d29c6cf6b4d42357259c7643ddb21ddd25bfc8ef4483a868869002a89e633d634092dacc0d3a696acd1e6152553d65bdae9a34935ae11aaef9871a71a830331a5243e86c1e183656e20826630552c7714418895c44031870b5ea07cb9a8060a220286a052f4e0966315e2566a8793fe85527f970da4547a7a52683d153ed5971d5fc0927b5320e99b9493c5f1f6c045d17038c14814112827bd343cbde15895989e90508c3441ca6dfbbfdc5f45ff1b1db17545ee66d472a04129678e1ebde82c3cb3823e8a6a8cc8ab67afb81dd22f2d1d04791795fb1d986ca43f3ca4ac932e2f0fc75f6e6b24510c88f8e35f3acdb5c74a3a580b31bc0ae5de51f62c1fb7b189e98447a3e28ff36b473bd89de541c4416a4816b00a5758b71bb607cffabfd494e2d426f7fbb1d89f609e650ef469a9f8be48371b2482c5e9f7b87c4a08f6b777396ec440208a3601b63eda91fde985fb0102afd1517896c8f3fd43e0d2e5236dc0ef6f7837e663ddf5d19d28fe009bd918b5d1f8568416e4d50c4746b0fac831d3a2196c746a60522fd44392bbf7b206aa37d08b6183d10b2c5f8d04a3c04b0515b96d5d400c643c9d373b1b580584716f5de106d348e8291d82e140999c7aefa9c30abd7406253200b4b0166d9c6ec3eb749d6aa5e69fda645a7392386fb8b6c84d10934131eed576206190597d2c42a8b270cc9589eca816d3f3ac563d2c794407c81063f2990f0e4ee19f11e8b7e0af8f82493d7cbba4dcf3a06c16d846842fa790a2b8eb6cbcf7b3f742163c85a3c6f204d1b2ca111b4d9b5301000674eee25ec424276f0dbb0857ffaa163c2359a6135bce0e5eb46ddd96fb34d98b134bca6c50f107c4d15e2d30d865bda54020fcb537a9ffc04f64077eb8d0fe320ac985d888788f0355fdfafb601da28be36b7b08512a166302d1f94a5847c3611cf18d6b1854f1cfa453715db5b97cb801d49adaf99ee44b6b05b857df42257b080b12c151c19c375dcb7f8809753f1eeffa86b6685f38ef588e6f16f386ae8bfb2e5667c8be54407b339f565134d809e0f077116121bc68ee22113402b925f21cbc9335e7b2960284ab857519f2c874eea2be336d9d820333c2779c6c9f873e256a62ed19ecd6052822549410739b43f54afe463c8bc0505811fc3458a3d5446b956b26616ff603d7991330fa8ecfb6cebf283b69f6e13254ec0cff841e61c7c50ddeedb73d5d02cafba8b533e1769ecd7d93e01d5b48607bec1434ffd324923923f522ac335bd75faf026d8dac3aa72bc912bdf4adfa54ed4db5764568135a031dd9404971b44d65b90fd3db5531485c1ef43c3d6acc88989751b53d879e9f26c2c309533184482960d7557fde42c15420c0e3baa845b31b32d7c6ceba700750c39c9f23ddc998418862b3a8af7e6192a56626f32942254ca8922d5af5f4230ef6aae46ea12e21a58c594d4f5abeaa648c1a743bbbfb7f2ba22e67b6b28f42639866c9f1e2a3a836347728b2da3bf60111dfff57bfd375e08c7dc72748e354f9be970eda7ebdae25ce325dc4b22102861447dcf2f6f8e2abed6d07dc51cbfc2f13c6f04ccde87a42623aed9e950719a7749c6037f4ba18a7a6ef49224ab9bc23fc242483d646b51d73a00c76150fa9360015f9f35efe6cf3ac4b566e8eb3af950d27d6e11c1c080ff5a5b4215ca436b4a930340f58cf68ba434f0b07b4e14494278b442e452e9de6c5c8291afa2ddfc02278fab352f1d4ad30df8f267d114d8adaf9495b4aab9bb0162e38e371465473cbccedca3941cc6a3ad2bafb6c109a5220117f7ae4f9e679be0547e6d6aef6f8a9d0a48353ed99265de3398f75d6c6b5764d6b35d7f2584aab2a38ddf5d07f3de94fcf2829d1fb36a54a6aae616637245779a7beab004fa87fe2cefbff52c34571cff82f96e6acd137033416eaa43dbf1a492f8e89f97d8e306386faa5c5ba9eed46338dced01c3cb9fea78c26d32d840a62b54d0dfae23bfb3bffbcbe8eaf06214261b044269fc71aa7f8af4c5a7b3ea1267768ea62d50606dd46e43e44826ebe4991ccc34e70f51bf529d383236a439297e7726c5b9a6462f983ec7d53aec22808a89f77a5aa89fbf9c8fd3e8d6602b545242e0e295184b09e6c3c60253c169c97edf6569e98e9668d74a1f7cb49714c0c155f7e86a786790ead102cb46db8465c4eea476c917eca7343cf8576d4b9bbb323d5089b16fafeb26317d2372ae6765a08137b8a0e8b2272f9f34dfc2042da8972acf2c113839959f2192cc2f9dd8b7d6cd100d14cf73aad3cc4ef2361b9f0563e9a5db78b382a85528fd59509c9d98e84eb8a082420bd97193889e8295205b7381631770650b4e1b182c81cd43f630ab9742183da6eb8c262489f13886d9e2f1cdf6df24b6ef9776caad04ee08f867e186d61cc0dc2730dba98", @typed={0x8, 0x88, @pid=r5}, @typed={0xc, 0x40, @u64=0x9}, @typed={0x1004, 0x68, @binary="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"}, @generic="f5e8c74b3726eaec6afa88bac956e06a111970b516e80ebae4426a627731ba29fbbfda80afa5a79a0662ba5ae7e1f8b4e0e8d9179b16c821b07e9749fb65847b39d62c7e4178b0ec4998cb1de614e2ed033548b0e2e2e75d46acb47ce47c0aca1cbe6cefbd0fe998706ee28e5ff8a7ad1bbaeeb919c91ffb8ba06cddcb40d3af64f501aaeaad4b00c5c3b65ef998bdad6baa7f1abf838f7eb62556389cd444befa742d5f8c88aca097b581da92872f051928dee90e6cc16fe6ab8c9c39bfef7d7c7c225caf74fade958f9339dfcbc909222066a06ca78f82e4595346c670fb9b102b331525b35e", @typed={0xc, 0x58, @str='*wlan0\x00'}]}]}, 0x43a0}, {&(0x7f00000049c0)={0x1918, 0x16, 0x408, 0x70bd28, 0x25dfdbfe, "", [@nested={0x130, 0x6b, [@typed={0x4, 0x3f}, @generic="13ad3bb270a5367483554488edc9bc824efddff845fb73ecc95c82938f6b38f51bc21d9e4572dcccc6f3d3e8d42896249afd07c49921339cf4b208e6e920a44dcd5ead8a0f717fcd40c7f324190a294b30f5141bdf050a325b3dedf72c22b08e98477ccecd4038bf1ddc7c39790404c694e47f25f12d43b87148d8093f0eb8d121fb", @generic="f1f57fab6bcfb786e659d780457f0996a632bd41da9cf54e4d5a28c3756afdcc0345c35da756b7e8147f472f2de87e0985ce49d612a8f70c8bda5cb573538d51310a2bd6080e5ca5067a1f14c817eb97599695214129490d94cc4fe85e7511970b1aea2e1fbb797162ed6f77beddfb6fd6", @typed={0x14, 0x5e, @ipv6=@mcast1}, @generic="ba7cfafbd3dc58a581949bdaa3dc07bd27fcc3350c2c6c28cf1b582670c3401c7b"]}, @nested={0x30, 0x5e, [@typed={0x8, 0x8a, @pid=r6}, @typed={0x8, 0x66, @fd=r1}, @typed={0x1c, 0x70, @str='^eth0##cpusetwlan0{[+]\x00'}]}, @nested={0x1d8, 0x88, [@generic="357c13f5c7acfe76e00b9372cd537f55785319eb7174a073a09f410aaa0383fefd148a00eb50f7", @generic="7630c182623e5b1b54c262672e3f", @generic="9ea460be6a1d1ad0a26b39eb67e56113ea42d20b9db2050d278583ef888cd637fe9623f6d05410bfa5c530f17bc3e33d0aa02b45f9b5f828de99d7025a160640c255c31d397e88a394e1a1336de9128403d2ef7d26e2c31575960b80e3be5cfa33f7e2d45139360498037936c8732fad72ac2165fa94df61080fe9161e5ffeaf62f5d380bb8cd5e6087e0aeb0a32c3a1ba34c1eb8a251b5c4c7ee446b4002d27695a233e4ebcf2c1689ec8", @typed={0x8, 0x70, @fd=r2}, @typed={0x8, 0x73, @pid=r7}, @generic="b040dbe704429eda3d63fc166cf9cbd48e96a3e44c21c01c6c7732f69abfd069b5ba2010b535df3bea0cb7239bdf908b53dd4370f9427f1bd854cec7662ec3234ae39dcce81830b3f52310b1230b0d62e7c085dc3852b70882bc930edf5b6fce0be0cda5c9e037abf1060df22059b4f02ee0090ee6eea3a10cb011f3191f3187ff854a48230cf34c267faf1fbcfee9e13ca0d534dd1b542ff01fba7b102a95abd548928d8e77f5936280122dcfc91f27e840457ec60c941a5058d26afd588edc3dfa1f3968e00cc30f8b5426c7409fe9b28de9dcee3ee686f8f8b5f2ff79e18fa30a2e26"]}, @generic="84", @generic="906ee4cd96320432793b97a85aa794ee9e4a776bc364ac804765eb87ca6f8eebe385b3f2f99c9d47df6baf104d", @nested={0x2c4, 0x2f, [@typed={0x14, 0x78, @ipv6=@loopback}, @typed={0xc, 0x53, @u64=0x6300}, @generic="e6d8bf1945dbcf17177fe659c3907c4cd7406510b543750f4eacc6ebebbdb099ec18f6598dd85b8dcb0a216e2e08ae52fc0f0f168bd029c7de4c36f2f15dea642fc3675fa18c71244abef6ce12792158eaf0339d29aa068d2a0d1cc9eae90a24e34af427e3a8407ace593d18a43e6a99b76be2d4deb5835ecc05520846421f4b8d0264f3e170c3c0c18c432ef2", @generic="6f941dff4fe256a15f9466a36df55a3429b26db55fd95a1520a99b6d8ec073e2373e89d60210fad35838896122a7c73757fc44a4b053de362c87bbb0a4d7b569d66a72c7a153c720775cb1780cf6cf90e5b59a57d209caf5", @generic="02bfee066bc01a67379da6abfe70c1ba01de4d9a882162bbdc3a61fb771fea323ca4e05f81420bc039528940f329bf688502c976cc31888140f8b98513ea8b0fc30157b77b6e7baf993ddafa1baa37825464c9c87fbcb1c9302640060802c858ee168d3c7af082a0aad09acff0402313c49679a7e57c34d4d06a12c3364020312d7b0ef51787ca0b79031bfaf8825016d1268399da67c34bb07aa896bb0abd0b5ffa669bd33cbce26e", @typed={0x10, 0x1a, @str=']eth1cgroup\x00'}, @typed={0x8, 0x2e, @pid=r8}, @typed={0x8, 0x1f, @ipv4=@loopback}, @generic="67bab89b8ff171e65e403d8922775f72507ce08e1aa2304345136492000a34d4e386e8059fd4366f7998438434c047b07bcd245ff5bf67e8fb6325955e1fc5ad8339e0e8924c31671f5367ed5675f9a4d2c67e21dbef58cb44a6b74081b775c7be984d5469887d69c5cd25c82063699661a0cd1983b917a3bb3dbe3206ed8dc915427806797c28ea493c2c1dc785fcd5c8f7da32feda1b2353b09ce6869fb1e670267cd75512c67e26e2458914e02111e3060b1cea2ba8e1307d2498525ea8c503a4bf44d9d5d595e977d9d680a36f740840b0fdbde5cbcb96a31b83fb72eca825579c50cd4364b48e130c44124e0019"]}, @nested={0x12dc, 0x24, [@generic="36eb2bb6c20882296c945338a27470e165d1e7ef54f6b9c3fedeae3dfee8c3331ef9e63721ff93abd23987fa9fd86313b47457ab93684a2a55fbf9096022e64ea35e8ed66759173ab32069a19e26843a27a659f31de50c9b02905983886463f8184134ab252c8d7723f990582e35b76d599449d8ec246f115a4a3818631f6024f7d1eb593dc20aa38d078a25d7", @generic="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", @typed={0x8, 0x8, @ipv4=@loopback}, @typed={0x8, 0xc, @str='\x00'}, @typed={0x8, 0x73, @str='+{!\x00'}, @generic="891029974fc655ecb616e840eef3b1a1a1559ad16f064e5a54c86ae21e86a51daec80f2e0d70ccc52a08950a0c76f18468249e74625e746a5cd99072dd01922e0359a7741ece0f6a8b720ea415616f626214c6d94df2b60de32bab7d82faa83383d6fa403fd3b9022faee91d917e596b214bf6c062dd16f3693aac03cf71e7cf1c7eb41bd66d3286cd1ed6ae0fc5", @generic="6deb5aebf414fdd802d8d7c1eda3fc32db97da055f343438a2bf5003b6337cc67f3ea70a9264a96d09f3bed3ce75ee05ec4bc1033dc4c091bcfc62c65953b40f618a8160d9298316f064d045b2af2003cb625982c473c5f472db8ab57019eb99522c74513f2f14bd0bed1abc2671a2f3a0aef6788eaf0eafe498df86c1863da0495b02aad49279d717c83e3fa25162ffe93765c45fe528d00fd02418f5af3d3d9339d35cadf6e1fb649bd250b5d660a6135dba36e4eaf054a9", @generic="de591e9757204697c958db15e68ec7ceea81ca7c43a974531eed0990d2a5167a3c020fd6b73ed7f4ef1ccefd7ff450e00b8c39d45125325264dbea901e6cd29ad156adb6e3bcf9a37c675547644860d60ff4751d3a13a43b959b1e731fe34e342bb3f00eb753e83800e41ffa80f47464abb1704569203d3277971341f4d64d3a5d82d8b99409a19c64061926efcf23d7493c000b2248945d59685d88a512631352fae4e7991d6cd5b52a22197ba647db788f6cda5867a1d442b40328eaffeba963fb2d629812960c987ac711d7c593ef0fe135a19d2209e7234bfaf65098ae09bf", @typed={0x8, 0x4f, @uid=r9}]}]}, 0x1918}, {&(0x7f0000008cc0)=ANY=[@ANYBLOB="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"], 0x10}, {&(0x7f0000006380)={0x4f0, 0x42, 0x100, 0x70bd25, 0x25dfdbfb, "", [@typed={0x8, 0x46, @pid=r10}, @generic="f45e72c58791c6ce37c321914ad32cff5a065e58dac8b3e7f2c755085ec245725789e4136097f2a27f491f9c6649dd5e37c708f893bcf10314cee39e85f3bd16d2bc3b2a821b486a004eedf8a5be222d9f576dafe00fcfead437fc9ddee975a7f66df67d348871564060607dd451b74e2cc07e7422cc09e963c4d8cca9fe0ef455eb1800723438eb210c1ba8d3b91e", @nested={0xc, 0x2d, [@typed={0x8, 0x6e, @fd=r3}]}, @typed={0x8, 0x37, @str='\x00'}, @generic="a047a63b45bd4161b777ea268184372146fa1becf945d1c29317e6b9354bd7ec9d1a334c36738043a77cf1660e2b89c399449f668d26ba3c661f0ce28b0d577cd87860ca4952a31fcdb94c5d984411b943f83ea2b0ab7265dbb79d323608bb2cfb6c7bb623e09c1b72292c4a96b227a4f0a4208efcd9561dd7494410ee9a3358677f85fb32", @nested={0x238, 0x25, [@generic="ed82d8bf0194c3347f917ff7ea23e16e7ce6f632fa1fbabf937715cfe3831367525d76253238805d74eeddeac430819bb8c9248fca6044afb2ff04a85de41367ac23b029e4e4b94d3154af7f3abf0b5632e9cb4c2d16e269e3313cf70c95244ff77adbea7ffc523112d52942cf13dfbf7cdd4b6d2e08febe34305a9dc77dbc9c5a5572c855c164893d2f075700daecd9f589af1e15e345bd6bf713141bce5d6ef93594fa5d0e381332b75e2707ac4e93aabc909a5cdebe684526ffdfafb72bdbaf4ec8ab312054aaf008a27e684539cda51b347986588263daf1f9485c2b2c47", @generic="0a9e870157869b960f7857a196b2dd5a2f80fa01d2d857d5673105ae4cd308f8c8ce2e07b3d336fdfdc41bd55128ae372096941fc4fc512174565de969ff43b42df61cb00593bf7670d641dced2f064469ed8841de20ba603474a944e133aa6ba3d9eafcaaf88f5e3c6f65dda6239e26c5f7c8823f40ee6b813c76ea8d717b53cc9a1a0f8828055edc4f7a45045fc665af227c9a311a887c1fb0c6901347ed348ccd8f85d210eb7f875d46f1de68633fd68d2d8d0d884c245d4218da5e0d2d74d12a308c18778a4a142ec9287343ca8ea07e6c48c4ff757b4fbd32cbd277ba62f286b7fe9cc9fe06e27edf3ccb23558a0e6973", @generic="db2e2402a06680c7c1082dbf571b157bc1aa2e943417c961e485297d1ecaa9d37801", @typed={0x3c, 0x5a, @binary="68f2e5396174888187c434d3411a714dd46c1f949542d6d5184a6750e8cb09fafa7b9984577c118ae5d57bf9d80e9337232ec00a0d22"}]}, @generic="925094404343a5182864ca4ecfa802ab60b8a69ef5c820134e457b932b7546ca29fc5e2759bafc02d0bfe655a51de4667467ae4eeb55daa3003dd5426063e19862d6eb98e8a2d90e1ff8734150316249dc6b7dffec113e37d21593dc6b71ad9e02198d23ba477abe6237cc5f1c4e6f0d47d87aa2e80d9a6f49b48156aa53191fee1eb50d9dd19e5b9929b84b629cf147afc32891fa847632cd249ccd603a7c9621951ddfcfcdfcc03b29332ffeef795b0977df1d110415860d8ed5c6fcf1a310fff6dee337b531fd60329f08", @typed={0xc, 0x8b, @u64=0x4}, @generic="6430d68de004626e1b3edd0f9efcdb7ca37b347ee1d6414e6cd4ec75e2e082a9593b1fc886975f10eabdbec4cf8364c49498a9ec7f143b45157e6ffdcbfb547df4d6b4598075ccfc7bf34a4b4340af00c76f78601cf5bb787ff853f1343cb38e86e4aa2995a56a9c5a6d6377adab833c51109ea63fd8202981f9c8802de8eb941396f3480f56e9e9bc37c7305103424818d13d28de85eb3d86bbadcdb808d5"]}, 0x4f0}, {&(0x7f0000006880)={0xa8, 0x18, 0x404, 0x70bd2b, 0x25dfdbfc, "", [@generic="35e34ff6208057871e4cabf9145219e4fa606cab0d5dda840d60867548d94d86897e480a4e9e1c8d1057a3048f2565e6db8d975c4f807a3172", @generic="3a1c5b0d80595d7358c4b16b7b95d343c9566a8786609c4977e47a3d1a0c33a19c41fd6b3c3daca02e5c64e79697a376159a73ba1fa4f204b62ab9be35bf690a867ffe6eebecd4d54e72ae0864a95f3f84d504b90a879a9be61ad1e8"]}, 0xa8}, {&(0x7f0000006940)={0x5d4, 0x1a, 0x202, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x2b, @ipv4=@dev={0xac, 0x14, 0x14, 0xb}}, @generic="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", @nested={0x3b8, 0x8, [@typed={0x8, 0x75, @ipv4=@local}, @generic="f3cdcf0fb3019afd4856c083737d40f78ca2ea910ab0bfe19349afcfd7ecad9f1779dedd552dc305fe0eadf56e2d84c325608eab0cdffd5d0ea2de3e432dae0a30d5b409cd26c4977f5aefb46c5f83932e43dc0d70647943c90b75e295aa9f9870300418dd28aeab830ed2627f3db0212ba7d169246b30a6bf29a29439d7aa6698ee209f0ad84f5715cb3c1177869729e7ec894f4ec9f1f9b216edc3830add9c27852b26a95cc1d1f4c81970ecc5ce9e8700485ad7aa34189af6723103d7ee2bc54e37", @typed={0x4, 0x16}, @typed={0xc, 0x44, @u64=0x6503}, @generic="e79a5320f614ebcd67cd62973817ebf18a6ee1953eb607776893abee9ea3b596947639a85b076814f87e3ece7b676af6cdd283102738459af79652cf55ecd28fc023bb746b92601d14610900bb7a8215f7ed4c336b927e9ed8356724584711c7d221a7baa271dbcf306d2359cbbcb928d724cf14c21e6c2df573c561ca93144d58a3d1be5d2fd3085018efe1a81a958275c345abcef8c39631c46a6ffd9386e488b1535815823c2fae14370b4bd25da76a9178f4c7f5537c3977b3286f70b042d6e52fb58bd691863bf172fb2ba6", @generic="6a2713867666c8950a22a2189b7c88c5854872c51d562b303af9fc6e388f43b55619ed813501eca1bcd58e317c4f4a778639a7c0f65ce28e9c060858e5fafc12ca0bc98d53b4548512401395c041a6d8b289d16a07719a94ad8885c62b3e9f8783b433d2ee8047fdff5a86b9066474f826817ac202f54754f7e4e287f57609fa4b822ce9235fbac58df42fe7f7da3737576c99", @generic="13dbdce637059f69daf916d34fe432945554f461f029da70bac3d46c26d44591e96eedff684c5c9ec50c3a361b6e2d06c0b6ef3068c08570c2457ac25359c467f01bf5eacafea8a066e1e5bff53654c569ddb9450dc0559f846c0110d2e37c61b300cda6f6047ce114bc1aaf3a2a6d6c3b26d462a2ff438484ec3e", @typed={0xd0, 0x3e, @binary="7382bfe8b86b44721559572ed596d3e81d0d4268920c6ce42993ad8783cba4c21781ca183c70385095837967bf2ac38b337f8f57bde4bfd4e2fe407a22249a405cf098ebdaf14c7f439c0a4889c072d6bd11119d3ae4ee8600404a50916d8c9569ed0945f838993ca5147bf3477a346e1fdfc35ea34e6c7840d5f1c68827242d46d3e865a619edaa4f37d4e4a687ca85dbba36fe5133bf2e574d468dd492c2dc5894d13d8d46e5935e1adf8980c0bc54541fec5ee8c8aea2aecf4b1b21c0f0ece3439a67b092ad2ee6d8"}, @generic="831943120f6f728789a062671223f6d7011210ca797d76a83b15d3f14faa5626c52e718a19", @typed={0x8, 0x51, @ipv4}]}, @generic="95c6f94832eabc2ea9802768e326325efa6648990bc35af4518805420da21eba7ab4acf90b0034d97d0fe6fe37f31433c8c4a0fd6b25c426260ab5593126ef3290bd22c1e5f7454b49c6d58545c6b2dbd8785d712264129d9ac73a8382bce00e4d55c7f453d26fbc012ceb0c67fbbe11b93880cc31e0593202f6098f4d838d541adcd628af17f9cbf52a77d9c83bbaee8779c1172fea57b1c1d269912e0d91b0195abd820566921cd794438c2e187be3bd08c9640ec1a7965362348164", @generic="cb28e7a96bf498c60d8910a816efd7e3bd7ad2bf1c2bde8b61eb3e1c0cba1ee37cea68885ad88494fb6777ea38f13ceb3a34414b1461ea1982381843252e7bcd28ded674efa9473970"]}, 0x5d4}, {&(0x7f0000006f40)={0x1d8, 0x1e, 0x400, 0x70bd28, 0x25dfdbff, "", [@typed={0x14, 0x6f, @ipv6}, @nested={0x1c, 0x80, [@typed={0xc, 0x51, @u64=0x3881}, @typed={0x4, 0x39}, @typed={0x8, 0x46, @u32=0x7ff}]}, @generic="9cd1566bd9ee51b6e7d36137fc026989b0b6b129133fdcd175f0048175ddac69b53453d8b70ce37199bae784faf70b704c9b730997aa867354b363af2ef3bc0a5b290405caa3c2b794a2708c66d3662826b119c38269ec020002fd4b67bc1146a9aeb5d3c3220d29cc3515e3346db7d31238cd4435abcc2221ebacc77b15604691c5e69195d9197b3c9b48882fd1da893b0aad154ad0bc78c28731a8c005f90cb9d8ff7a829ab986c69e23915716858be0ed9c7062b82b95089e21396c1ce2d5bf1e3697c1354a70", @generic="bb690dd2af9267d198e5dcf1cfa75cc4decf335a9156d5e216b8105a4e950e94b9104ea84fb5473ec691bbf9af5ddd4b6b4986af685624b3ed6d349be35a3c8d1088caf4f90aaa73752554a2feb0f2d4951179125088e7a9c55cdc037ccfe016c8a89ce761c2e75a420b47ca06337eb12dcf44bee1f5926126e47022e4e47717754cc8bbf78edee6e51318f889abe774e04868ff52358dadd8d53ca16dce32e2577d69b21ad6f7324327defee3527c4c0eaf2a972facdb738732bd248d3a50d604793ce7c9d7c0d27742ae34d6", @generic="dba5"]}, 0x1d8}, {&(0x7f0000007580)={0x790, 0x19, 0x8, 0x70bd27, 0x25dfdbfe, "", [@typed={0x4, 0x27}, @nested={0x40, 0x2f, [@typed={0x8, 0x19, @ipv4=@local}, @typed={0x8, 0x45, @u32=0x3ff}, @typed={0x8, 0x8a, @str='\x00'}, @typed={0x8, 0x86, @uid=r11}, @generic="b43e88be42865bb893c4d5e97f52c3ac", @typed={0xc, 0x1f, @u64=0x3}]}, @nested={0x98, 0x6c, [@generic="75c15c7567e2998e5d1032fe6eafa19b5b7f3153ad9a0c90e1409058c8e549bfd365cee05d0d1f71e3b2f2b009e6b6c117b10d165ed3b4583429d3684e29cfe9500b50989d3a004706bb9ae4cb1fe40a32b83179419d0005f8354743f3dcc59c1a0566c8796ece69ae0c2f8ccf2f2da692e50ad988d91cb195505a11dc42f13f", @typed={0x14, 0x49, @binary="37b3cd013a121f1f4254ea01ec4415"}]}, @typed={0x14, 0x8e, @ipv6=@dev={0xfe, 0x80, [], 0xb}}, @generic="e0a4dd4197d3bb4c647eb4f05e254cd4f685f89d67b5d0e5160ef2780cecc298aa296d82541ba344a1cfabceb4e06abb41940e13dd7cb6de70a79591f118c38a2ca9b2db4ef9", @nested={0x144, 0x8b, [@typed={0x8, 0x93, @ipv4=@rand_addr=0x8000}, @typed={0x8, 0x16, @uid=r12}, @typed={0x8, 0x2d, @pid=r13}, @generic="749c5cf51c8b9650a96bdb301a1183174f67cf8bc49d8f762d45c87a549d15f058134cceb32cd521dac2d9b5138e12afee4e17d1ae5e64197d0703e23352d90c6b309a1a476b31090e85181d64b5c90b2255c5f1c03ee48e41886dd044ad7ca5c0066581fdeeec59b84fa11d626ab69d511d70e08949031a776fd9abb6c773a40425a3921c1eeb43c817bad4bb3d98e763a16d72930d40e39f0dfe49a081a8406c44669db3efa5ac4311bcd12dc7d6be602fc00c0adb8be41d97b0c9c30e69b5de1f91f25714b37cfa4527aea1e381d34aa72818c27886ee27dd9d0c4e739522b64339c23558fe33f5fb667b65db733fcdc369d7e131f3", @generic="44ed663a113aa3e9e97d941808a7ae5402", @typed={0x8, 0x21, @str='\x00'}, @generic="0c29e19c8c907966b1dec5dfbec20c3f18c9a148ab"]}, @nested={0x400, 0x24, [@generic="6a99963f84f3eb1fcf5f32cac45e674bcf3e1fb5ef4ab0acc0c465c3eeb0ba5ad9f7d5236efd52040c6a5b808ba50a04734bbb2601beee1aa5c6ff9bc940e1c81e556aa6842be4246bbacb7c10151933481d01beb690504dc1b5baf4ec2efa2d34087d8c4b4a13defd2aca7caa46db411eb12c1e8cf56baa2db1598ab14cd57e0bb23f508a891618893a52ebfaba2fd2c5c175f26097c9b51a5dd381507c608873803dc41657b367e9599aa125af3b1e98504a20616a16dac485", @typed={0x8, 0x96, @uid=r14}, @generic="5b70c3203c605a82d343d48a5c940ff0eb7c06b442a433328e17913922a7959f5a59654f0e45e32db494f3d15847e52edc279997ac373786599144cbc8fb0e3015d9ad0ca303c61cc2004a28cd3ef71af7e2db3be4cc4225491db9814f840063c6b427f035f115a26cdbf6201d1b1c374a3bc60fc316ae472ef294b3c7", @generic="8af80a7e3596dbd273828c79db752e963b4b0035108f9cbc7d5bd002601d3709b34c26e24115563634c21c8bbb8fd51cca8b8171cb089a2bb0923256789da58dceacd0a2bb40266836f91bdc35fed4a7429e6d2cb9d43ccedabeeff09f3bc028a02e54f902ae3f160856cc2daf6693da2b979aeba109ab831e2a23a2f71cc205cb315b37412fa1f281708163d555de12150b3a862fa61638a164352b9e0f110936122ba897c4777ed9b72f54b2a896bd7df866b4c3a3689971ee5629", @generic="da2a43a3fe732077054ac26926fcbb2ad5415ac71447b43d6a05ac7dde40d6e6a56ffa6632dc4a25c101dfb5adb6c5990c8da850b381af57c68031bbb4e2295a3400eb8472b80ec6ab30237ff4bfbc59cc5620378e7120b5aa32a54c50d842c1fed55b01ef80c03c5d80e31fbeb21a781001897094e0941962a090", @typed={0x8, 0x6e, @pid=r15}, @generic="5254ce9f64922202762cf14e311cc5445c23bd0a21fd8495b2dc1e9a69f4311ebba043168d3c41d3d377748aa7b18b58b526e00cb4d83477", @generic="cd9acdb80b81e5c158482a2dd45b7b1d0528a3d48bfe9a1df85c309675e686a8ff98858a74d642ff4a2c61d874595504edc72e0dc818c71eda7d2c1f60f6cd3fec11f06334bdfce00572277aa3bd3221f1398546047b0375a13611aeda37d9724fc6d12276aea9d6107db4d99319d8554c64f466f3f75ff964dd0c5a730314fcc758375c9a8330a9ef94203d75ee47efcdec6ea5032ddb91383d78aa7ccd1a8ed05db8e0b197e6bcc3e5857b3a646e42b37e3fc4287aa685f536863e96b061c34dfddd842f957599de0151328762f59af816f1bdeeb787eaa972d715af7c51a11fe56d68c57a6cb35ac69e585497", @generic="a31c415701fcb6994cc2ff5e5e8e0649a7723d0dca802f7b38656b67ce2d73945a687988ad3c26e8c07e2448b19079f2ac6b4241b8b76e5ac736ee856686c1682838b3df6dd9f13e6135b7a4a108bb97c8f2c6a8b3"]}, @typed={0x8, 0x69, @uid=r16}, @generic="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"]}, 0x790}, {&(0x7f0000007ec0)={0x3e8, 0x25, 0x5, 0x70bd26, 0x25dfdbfc, "", [@generic="4e5d6aadd58109e471ba911d909ab066cbc55eebb9471a17a90595c6967f8e1eaef17edc197c6805b838fd79fcc3486f82a0dabcdc3d9ee83244708e16c6e0501d5c02cc5db746994261f1ba83ad975e7a7f093c6798d02700df74d66033ea162bba0e475ae355de984c394b3d177fc8", @generic="6aef9e62697040d00e61e619ff204a7c8e25f21bff6b5f5071be13763381e7e655fcacb12acd205971d6c8563a8402a4cadc5277153f8c6429d93da4eeb1778efd5d9fcb152c5953c7254e638f93fdec16c2c41977372a0b19cf892eb09f62b45bdac5489eb0586b354a3c407a016719225e3bd4876116fcfe10feeb0dfae2398c8615ed493395e0ca1618f3d16e7984f016441be619934789036a3cabf6b4e32c15fdbabcc3de93825cf1cf670b6ccd1982823ae0bf5dbe6690f41be561b1df68de0b588ac4253829fbf4b7df6a883362bde18d2f68bdee191af09e57342332ec50b7b42ae761a75f0912040367624b8a28707abdf4a79a77", @nested={0xe0, 0xfff, [@typed={0x8, 0x59, @pid=r17}, @generic="049bbecf464fd3815444fadc6569021a32bdb99840aa1caf4e927f0d35d0952fe85e50411ee0dae889636f19a02d993ff0220bde0aa982fc687af2e0f192518079e07fe1e1ec25380987d0b128b2ace1ce4169ee509c39fc06462993bd07f76ebcf04bcc76f1113750cb28ffa6", @typed={0x8, 0x3, @ipv4=@remote}, @typed={0x8, 0x5c, @pid=r18}, @generic="573804577257112b428f8201d794d8f22682617cccd6865b8df184ec33872ff17aa39aecadb6402e6953909ea81a80d3e1accb1361b968be8366911fd761ecb49fd0076d5a9b26e5797e38f9", @typed={0x8, 0xa, @fd=r3}]}, @typed={0x8, 0x89, @uid=r19}, @typed={0x8, 0x87, @ipv4}, @generic="244a3401313709562feba2755b6fa669b303e4b978b5817ce339a9aac74418ef133e3ce98d582c17ff092b167d9a9789de538b7c1edab7e3e28279122b6d21777295dfeb41325ee34c80bb52980f08a98e7f6b370fa90d10c45c81ae9561d2d3c034058a59db1aea74f5bada77355ba56031f480e869d8370bb8208f7158fade28b59cedf59098d792480b556b01b313c99f1008699778d9bf4252953f0c49e19c5153389c578b0182d74181112a0629b0d9f7e9d50f", @typed={0xc8, 0x42, @binary="102f47d3fb050d6afc5c8257a097cbe60528165e0479fbdb2ac921833c96ded0870b22468181f1fe2512addee2b5ae820d4fb3c7454105a73405940c0137abbc0cc852e3bb5e6032bcc415896bcd16986dd9751c63d897136834ef09d7a6f9ceda2dc1d861122cbadb661d7173afbed7ec7a0e1b1bd0e39849f66c9b58cb981c1aaa7e6206d33a95e70cc1a18d83da25123164263a15b3b228475c21bb9a2a3b664718ace22b595ca24469b77e2a91bb321075246b33c3a34ee30f5a0711754cc76c0f"}]}, 0x3e8}], 0xa, &(0x7f0000008b80)=[@rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x18, 0x1, 0x1, [r3, r0]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @cred={0x20, 0x1, 0x2, r32, r33, r34}, @cred={0x20, 0x1, 0x2, r35, r36, r37}], 0xf0, 0x8004}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r38 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r38, &(0x7f0000008e80)=""/91, 0x31) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000000)) dup2(r38, r3) 17:48:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x1000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:48 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x9) 17:48:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x40200, 0x4) fsync(r0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2, &(0x7f00000000c0)={'trans=unix,', {[{@posixacl='posixacl'}, {@aname={'aname', 0x3d, ')cpuset}-'}}, {@cachetag={'cachetag', 0x3d, '#$'}}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}], [{@pcr={'pcr', 0x3d, 0x6}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}}) 17:48:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x10000) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0xfffffffffffffe00, 0x1c, 0x7, 0x8, 0x9}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 17:48:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 323.191050] QAT: Invalid ioctl [ 323.196188] 9pnet: p9_fd_create_unix (12307): problem connecting socket: ./file0: -111 [ 323.209868] QAT: Invalid ioctl 17:48:48 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xffffffff000) 17:48:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xad00}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x10000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r1, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x6, 0x0, 0x1, 0x7}}, 0x20) read(r2, &(0x7f00000000c0)=""/91, 0x5b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000140)=0x1, 0x4) 17:48:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:48 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x444400) getsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000080), &(0x7f0000000180)=0x4) clone(0x0, &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000140), &(0x7f0000000240)) read(r0, &(0x7f00000000c0)=""/117, 0x75) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000240)={0xf19, 0x3e9, 0xf49, 0x7, 0x2}) 17:48:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x2) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x200000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:48 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)="6d656d6f72790100000016000000ea66571d6ef0133000", 0x26e1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000080)={0x40000008}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x40) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) 17:48:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x8000a0}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xa1, "e4f4dbb43ed2dd8bf38d6bcabf068b9fb89f176ac1cbe6384a8c6a815d09cc45aff3f61d6b9e685dac2482a36322b54df7cb230bea1ff46591391b8ceea3e82a4e2fa5ecce069f84e69310a8605ac7f5781287f661a681a4587385f8b115afa03b29b2a8c56d5da14ecbd1c59dbdf108dfaf299546d01116ee4f44ec37ae602c745fa2a8e309b3c4350ec2ae9bd58c5259ef1bf26844355024877bf2640c4de7dd"}, &(0x7f00000002c0)=0xa9) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x1, 0x1, 0x5, 0x7fff, r1}, &(0x7f0000000340)=0x10) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000000c0)=""/69, &(0x7f0000000140)=0x45) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000380), 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) fsync(r2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000010cf0706faf9a81a49024aee8286000000020000310bad4547024bc4ad93ef7e26ae8f7811efde793ada731eab8f0ca3040bf68611b64d79bd2ab2672575ac9ef438607cfb1206da30867b62e73890505d1d4c7d4589b777a893268b1dcc97db458ea41e699a4e6a94202ed17db54531fdcceea0658e96329d1be743c15a801efd8c47be70611f94c09b9d141fae8c7f623c8a1c97ead80a986057b35bac89162ead415ca5799b16c5d656372f0c34e3be1227f0330c8c476c5707179cc6320291ef938e8e86070fd264941bc96a04e9accc1432449cde8f985b708e1e841f613f8b"]) 17:48:48 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = socket(0xa, 0x80000, 0x2) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x3f, 0x8, 0x400, 0x8}, 0x8) r2 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) close(r0) [ 323.677621] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted [ 323.751544] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted 17:48:49 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xffff8000) 17:48:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743212", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x700}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:49 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x7ff}, 0x28, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x40) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x22) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x5, 0x7fffffff, 0x8, "abceb172a2a4a28d7655acb0a826ad46b27875f52d9560e16ed72dfbe52518a2dbd6900826d5f9e6a0af9b7862e4531d93b4c80b3aaf55bafa4823a925e50204edd4bcf9c7732f3b7f896323d8324aee"}, 0xd8) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000800)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0x10, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 17:48:49 executing program 3: r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd95ede8c137a96de91be10eece000ee9a9ad8be223439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 17:48:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) 17:48:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x4}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000400)=""/57, 0x39) prctl$seccomp(0x16, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rtc0\x00', 0x100, 0x0) r1 = fcntl$getown(r0, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r1, &(0x7f00000004c0)=&(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)}}, &(0x7f00000003c0)=0x18) socket$vsock_dgram(0x28, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") socketpair(0x10, 0x1, 0x5, &(0x7f00000002c0)) 17:48:50 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfffffffffffffdef) 17:48:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x1a0ffffffff}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0xff6, 0x8000, 0x84}) 17:48:50 executing program 3: r0 = msgget(0x2, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f00000011c0)=""/4096) 17:48:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001680)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="c8d03b893815295c035a801c169e5b47160775b005e30100", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000008080)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='5', 0x1}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x7c40}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 17:48:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0x16, [], 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000002c0)=""/22}, &(0x7f0000000380)=0x78) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:50 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x10000) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x1}, 0x0, 0xff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:48:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x3}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432fc", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:50 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x181001, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000980)="86", 0x1}], 0x1) 17:48:50 executing program 1: sched_yield() mkdir(&(0x7f0000000080)='./file0\x00', 0x7ffffffe) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x40) fsync(r0) r1 = semget$private(0x0, 0x2, 0x80) semctl$SEM_STAT(r1, 0x7, 0x12, &(0x7f0000000140)=""/47) [ 325.829461] kauditd_printk_skb: 22 callbacks suppressed [ 325.829476] audit: type=1804 audit(1539712130.905:312): pid=12493 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/208/file0" dev="sda1" ino=16597 res=1 17:48:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc074510c, &(0x7f0000000080)) 17:48:51 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfffffdef) 17:48:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x600000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 325.896595] EXT4-fs: 14 callbacks suppressed [ 325.896608] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 325.915597] audit: type=1804 audit(1539712130.905:313): pid=12497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/208/file0" dev="sda1" ino=16597 res=1 17:48:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 325.992210] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:51 executing program 3: keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x0}) 17:48:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1) timer_create(0x3, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)) timer_settime(0x0, 0x100000001, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) 17:48:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x300000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000100)=""/119, &(0x7f0000000040)=0x77) 17:48:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:51 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100000000, 0x200880) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x7, 0x9, 0x9, 0x203}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x144) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x40, 0x500) fsync(r1) signalfd4(r1, &(0x7f0000000080)={0x7fff}, 0x8, 0x800) 17:48:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xa0008000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = open(&(0x7f0000021000)='./file0\x00', 0x2, 0x5) fsync(r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x200, 0x10000}, &(0x7f00000002c0)=0x38e) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9, 0x20}, &(0x7f00000001c0)=0xc) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r3, 0x80000000}, 0x8) socket$netlink(0x10, 0x3, 0xf) 17:48:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) [ 326.362991] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 326.509337] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 326.869092] audit: type=1804 audit(1539712131.945:314): pid=12573 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/209/file0" dev="sda1" ino=16690 res=1 [ 326.907438] audit: type=1804 audit(1539712131.965:315): pid=12575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/209/file0" dev="sda1" ino=16690 res=1 17:48:52 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xf000) 17:48:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x5000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000000, 0xa0000) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432a0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:52 executing program 3: 17:48:52 executing program 3: [ 327.109889] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 327.137655] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x300}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 327.190896] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:48:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x10) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 327.234337] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:52 executing program 3: 17:48:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xad}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:52 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xf0) 17:48:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2h', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 327.401110] audit: type=1804 audit(1539712132.475:316): pid=12610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/210/file0" dev="sda1" ino=16755 res=1 17:48:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x3f}, 0x28, 0x3) fsync(r0) 17:48:52 executing program 3: [ 327.471089] audit: type=1804 audit(1539712132.475:317): pid=12614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/210/file0" dev="sda1" ino=16755 res=1 [ 327.537887] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 327.575706] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x6000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:52 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfdef) 17:48:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 327.625291] audit: type=1804 audit(1539712132.665:318): pid=12627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/211/file0" dev="sda1" ino=16756 res=1 17:48:52 executing program 3: 17:48:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) fsync(r0) r1 = fcntl$getown(r0, 0x9) ptrace$getregs(0xe, r1, 0x80, &(0x7f0000000040)=""/236) [ 327.759775] audit: type=1804 audit(1539712132.665:319): pid=12633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/211/file0" dev="sda1" ino=16756 res=1 17:48:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:52 executing program 3: 17:48:52 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xffff8801cf743060) 17:48:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x4000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 327.905701] audit: type=1804 audit(1539712132.885:320): pid=12652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/212/file0" dev="sda1" ino=16789 res=1 17:48:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x440, 0x0) fsync(r0) sendfile(r0, r0, 0x0, 0x4) write$UHID_INPUT(r0, &(0x7f00000001c0)={0x8, "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", 0x1000}, 0x1006) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 17:48:53 executing program 3: [ 328.011284] audit: type=1804 audit(1539712132.885:321): pid=12656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/212/file0" dev="sda1" ino=16789 res=1 17:48:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x5}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:53 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x10) 17:48:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x20080522, r1}, &(0x7f0000000080)={0x0, 0x6, 0x9, 0x6, 0x3, 0x7f}) 17:48:53 executing program 3: 17:48:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xffffffffa0008000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:53 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfffffffffffff000) 17:48:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x200, 0x0) bind$vsock_dgram(r0, &(0x7f0000000340)={0x28, 0x0, 0x0, @reserved}, 0x10) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000380)) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x20000, &(0x7f0000000200)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}, {@metacopy_on='metacopy=on'}, {@upperdir={'upperdir', 0x3d, './file0'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@euid_lt={'euid<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, "76626f786e657431c06b657972696e676b657972696e676d696d655f747970656c6f766d6e657431212f"}}, {@fsname={'fsname'}}]}) fsync(r1) 17:48:53 executing program 3: 17:48:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2H', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:53 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xa) 17:48:53 executing program 3: 17:48:53 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x400000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x4) fsync(r0) 17:48:53 executing program 3: 17:48:53 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x8800000) 17:48:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xa0010000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:53 executing program 3: 17:48:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) accept4(r0, &(0x7f00000000c0)=@hci={0x1f, 0x0}, &(0x7f0000000140)=0x80, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bcsh0\x00', r1}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x4, 0x6, 0x10001}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e23, @multicast2}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x5c, {0x2, 0x4e22}, 'team_slave_1\x00'}) fsync(r0) 17:48:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x500}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:54 executing program 3: 17:48:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743210", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hfsplus\x00', 0xa00000, &(0x7f00000000c0)='bdev[)self^$\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x7ff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x67de}, &(0x7f0000000280)=0x8) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x20) fsync(r2) io_setup(0x6000000, &(0x7f00000002c0)=0x0) io_cancel(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x4, 0x77, r2, &(0x7f0000000300)="1eb3ac9c561d8ca517ef093db79a961aee76f5d3dcda62732b409d28b8107bd5f1abf532484fa52b460c518bd3ed5c39b43257433c759c351683a2fd25679d8718bcfb97ffc40a521f40c154bbd35e9af7ec3af96a80d8ef85c23fb07cfa1ea91410e3fab60eb691a076b582e221adda195aa303dd79f1787766eb46c4aaa69d2b859825bea015bd9c4b162a872c52f64eca53d72fb9313df04ad2a220e7837869af6f18d5898fd46364a3326b904caac4e9c02c014ea419cffb5a9cc05a", 0xffe2, 0x6, 0x0, 0x0, r0}, &(0x7f0000000400)) 17:48:54 executing program 3: 17:48:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x7}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f00000002c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="ab55992769d5197db24187b33da0a088c1d4f9fdb014730b9ee5e7699dd2eb7c54d23140aee7efafcfc1192ae49f34490498eac719400e14da75fc88a822445cae973bfeebfd88f6776b152772e0cc996063fadf29d1d521bff6f965c0bb03d8365e493ca2728e7002748da99bfbb21d4ee7f775e0e73ea11db093034b05bb79e86d85474bb6cc7592", 0x89, 0x4d45}], 0x80840, &(0x7f0000000300)={[{@allocsize={'allocsize', 0x3d, [0x7d, 0x3f, 0x36, 0x7f]}}, {@attr2='attr2'}, {@swalloc='swalloc'}], [{@obj_type={'obj_type', 0x3d, "2c757365725dbf73656c662b"}}, {@obj_type={'obj_type', 0x3d, 'em0cpuset'}}, {@euid_eq={'euid', 0x3d, r0}}, {@subj_type={'subj_type'}}]}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:54 executing program 3: 17:48:54 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xc) 17:48:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:54 executing program 3: 17:48:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0xffffffffa0010000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) 17:48:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:55 executing program 3: 17:48:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x2}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:55 executing program 3: 17:48:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) fsync(r0) 17:48:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) 17:48:55 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfffff000) 17:48:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:55 executing program 3: 17:48:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xea00, 0x0) fsync(r0) timerfd_create(0x20000000000005, 0x800) 17:48:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x500000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) 17:48:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2ad, 0x80000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000100)=0xffffffcc) fsync(r1) 17:48:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x100000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:55 executing program 3: 17:48:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2l', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x3000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) [ 331.131178] kauditd_printk_skb: 12 callbacks suppressed [ 331.131194] audit: type=1804 audit(1539712136.205:334): pid=12962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/219/file0" dev="sda1" ino=16817 res=1 [ 331.170718] audit: type=1804 audit(1539712136.235:335): pid=12963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/219/file0" dev="sda1" ino=16817 res=1 17:48:56 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfff0) 17:48:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x20001) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000040)={0x10000, 0x3, 0xafc8, 0x8000}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r1) 17:48:56 executing program 3: 17:48:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x1a0}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:56 executing program 2: 17:48:56 executing program 2: 17:48:56 executing program 3: [ 331.319681] EXT4-fs: 21 callbacks suppressed [ 331.319700] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x2}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x6) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsync(r0) [ 331.458596] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:56 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x9) 17:48:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x100000000000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x2}, [@nested={0x8, 0x3, [@generic='!']}]}, 0x1c}}, 0x0) [ 331.607054] audit: type=1804 audit(1539712136.675:336): pid=12994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/220/file0" dev="sda1" ino=16808 res=1 17:48:56 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xac00) 17:48:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x300000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x100000002072, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000004c0)=0xfffffffffffffffb, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000740)=@assoc_id=0x0, &(0x7f00000008c0)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000900)={r1, 0xfffffffffffffffb, 0x30, 0x0, 0x5}, &(0x7f0000000940)=0x18) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0xad, {{0x2, 0x4e21}}}, 0x88) read(r0, &(0x7f00000009c0)=""/199, 0x8a) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[@ANYBLOB="d100000000000007003068da4174fb57d730b265e0f20300b6daa9cdf7fc1c3cb87155a9d8000202000000000087c0c511898b54cb1a9a341728b978268d01cf8014c68542e71c151b8ecf2321b2d315d28101705f4c"], 0x56) recvmmsg(r3, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffce2, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1, 0x0, 0x16c}}], 0x1, 0x0, &(0x7f0000008bc0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r4, 0xfffffe8f) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x300000a, 0x8013, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x1, 0x2, 0x2, 0xc, 0x7, 0xc8, 0x3}, 0x20) r5 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000440)=ANY=[@ANYBLOB="040000006af10106f29f92bb35673bf900000000800000000000080000"], 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x397, 0x1}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYBLOB="fbff0200a1e42e0068c50d4017c6da9d90c6ca5a8834c70ec44831c34adf31d383e676863d7f35852582c5124e08681ddd21ad6f6c4822d9b54e47eef18e827bf181f221928488ed88d25690d32eba808bdc7da55ac93d6b61632c6f7142e835a9b8c5"], &(0x7f0000000780)=0x1) r6 = socket$xdp(0x2c, 0x3, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000003c0)={0x987, 0x3, 0x8}) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x3c000, 0x800}, 0x18) vmsplice(r5, &(0x7f0000000cc0)=[{&(0x7f0000000c00)="d2c7ba8dc460f66c9b5d4a02a69b5ba9de4fffaad30739b46a0432de6592dc2c99b37ed3f384c0b9f21867c28ba1c1a1cfb626fd424400d9501b5eec1e7ff3097520ab32afaf4e3d14815965e92a4ab092605f10d85ac95c810bfd2e25d463ed7da8b8bf9ac5185d3a571a2a27fdc282aa632885bfc7c31b09dfae11835b40be3c72891f3b9137d2669093cfa6b9a20f3fb264a5623ca6efa1fe8178748c09f5f4b12ff2cf7bab059f997580db0597e165a7ed5b045b", 0xb6}], 0x1, 0xc) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, r7, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000040}, 0x840) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000007c0)=0x4) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000300), 0x4) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x8, 0x9, 0x9, 0x7, 0x2}) 17:48:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') [ 331.663417] audit: type=1804 audit(1539712136.705:337): pid=13003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/220/file0" dev="sda1" ino=16808 res=1 17:48:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xad00000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75700000000000db887974a9d4b8049e206606a808fcfe3dd31291f786cee92a2ed9cc0eeb0f6e1b21700557d7d321c616f2a69f975e5d5807683103cf48516fd96063603193e1cc3109ac8eeb3489d6a5d86eea6fc66adc6c92378d49", 0x200002, 0x0) fchdir(r1) mknod(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') 17:48:56 executing program 2 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x1a0}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 331.855257] audit: type=1804 audit(1539712136.925:338): pid=13024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/221/file0" dev="sda1" ino=16835 res=1 17:48:57 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xf) [ 331.916215] audit: type=1804 audit(1539712136.955:339): pid=13029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/221/file0" dev="sda1" ino=16835 res=1 17:48:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x1000) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, &(0x7f00004b3fff), 0xc0fe, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) [ 332.013497] FAULT_INJECTION: forcing a failure. [ 332.013497] name failslab, interval 1, probability 0, space 0, times 0 [ 332.035274] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 332.048185] CPU: 0 PID: 13047 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 332.056720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.066079] Call Trace: [ 332.068691] dump_stack+0x244/0x39d [ 332.072347] ? dump_stack_print_info.cold.1+0x20/0x20 [ 332.077572] ? lock_downgrade+0x900/0x900 [ 332.077602] should_fail.cold.4+0xa/0x17 [ 332.077624] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.077659] ? lock_downgrade+0x900/0x900 [ 332.077692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 332.090973] ? proc_fail_nth_write+0x9e/0x210 [ 332.090988] ? proc_cwd_link+0x1d0/0x1d0 [ 332.091012] ? find_held_lock+0x36/0x1c0 [ 332.113345] ? bbr_lt_bw_sampling.isra.5+0xd28/0xef0 [ 332.113377] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.123919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.129480] __should_failslab+0x124/0x180 [ 332.133740] should_failslab+0x9/0x14 [ 332.137581] __kmalloc+0x2e0/0x760 [ 332.137597] ? strncpy_from_user+0x5a0/0x5a0 [ 332.137616] ? fput+0x130/0x1a0 [ 332.137633] ? do_syscall_64+0x9a/0x820 [ 332.137646] ? __x64_sys_memfd_create+0x142/0x4f0 [ 332.137660] ? do_syscall_64+0x9a/0x820 17:48:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x3000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 332.137680] __x64_sys_memfd_create+0x142/0x4f0 [ 332.166319] ? memfd_fcntl+0x1910/0x1910 [ 332.170469] do_syscall_64+0x1b9/0x820 [ 332.174367] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 332.179746] ? syscall_return_slowpath+0x5e0/0x5e0 [ 332.184717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.189596] ? trace_hardirqs_on_caller+0x310/0x310 [ 332.194631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 332.199668] ? prepare_exit_to_usermode+0x291/0x3b0 [ 332.204709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.209601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.214802] RIP: 0033:0x457569 [ 332.218003] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.236926] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 332.244645] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 332.251920] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 17:48:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x7}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 332.259196] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 332.266467] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f300fb3a6d4 [ 332.273739] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 332.283698] audit: type=1804 audit(1539712137.355:340): pid=13050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/222/file0" dev="sda1" ino=16847 res=1 [ 332.312045] audit: type=1804 audit(1539712137.385:341): pid=13064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/222/file0" dev="sda1" ino=16847 res=1 [ 332.352882] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:57 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:48:57 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x223) 17:48:57 executing program 2 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x2000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="657874328c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 332.498050] FAULT_INJECTION: forcing a failure. [ 332.498050] name failslab, interval 1, probability 0, space 0, times 0 17:48:57 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x40002, 0x90640) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffff0000000008000000000000000700000000000000", @ANYRES32=r0, @ANYBLOB="000000003af179040000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000010200000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000ff0300000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB="84f7fe9fc33806315159cea2b0a459e02dab41ca14c45de8022d96b850af461d0432db95019bd3f1060fa4f4cd08f0dbc373481bda3f1c9b69b6159cdcc9b5604b107d4618d16ff5048224853060f20578a527cbda0ac345d153a55cf4", @ANYBLOB="00000000000000800000000000000000000000000000000000000000"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200100, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000040)={0x2, 0x0, [{0x4, 0x2, 0x0, 0x0, @msi={0x7, 0xffffffff, 0xffff}}, {0x6, 0x5, 0x0, 0x0, @sint={0x4, 0x5}}]}) [ 332.524747] audit: type=1804 audit(1539712137.595:342): pid=13077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/223/file0" dev="sda1" ino=16837 res=1 [ 332.586983] CPU: 1 PID: 13078 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 332.589449] audit: type=1804 audit(1539712137.625:343): pid=13080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/223/file0" dev="sda1" ino=16837 res=1 [ 332.595562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.595570] Call Trace: [ 332.595607] dump_stack+0x244/0x39d [ 332.595644] ? dump_stack_print_info.cold.1+0x20/0x20 [ 332.595683] should_fail.cold.4+0xa/0x17 [ 332.643851] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.648980] ? find_held_lock+0x36/0x1c0 [ 332.653080] ? zap_class+0x640/0x640 [ 332.656818] ? __lock_acquire+0x62f/0x4c20 [ 332.661088] ? lock_downgrade+0x900/0x900 [ 332.665255] ? check_preemption_disabled+0x48/0x280 [ 332.670294] ? find_held_lock+0x36/0x1c0 [ 332.674398] ? expand_files.part.8+0x571/0x9a0 [ 332.679000] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.684473] ? find_held_lock+0x36/0x1c0 [ 332.688568] __should_failslab+0x124/0x180 [ 332.692826] should_failslab+0x9/0x14 [ 332.696647] kmem_cache_alloc+0x2be/0x730 [ 332.700825] ? shmem_destroy_callback+0xc0/0xc0 [ 332.705513] shmem_alloc_inode+0x1b/0x40 [ 332.709600] alloc_inode+0x63/0x190 [ 332.713246] new_inode_pseudo+0x71/0x1a0 [ 332.717323] ? prune_icache_sb+0x1c0/0x1c0 [ 332.721591] ? _raw_spin_unlock+0x2c/0x50 [ 332.725761] new_inode+0x1c/0x40 [ 332.729145] shmem_get_inode+0xf1/0x920 [ 332.733138] ? shmem_encode_fh+0x340/0x340 [ 332.737394] ? lock_downgrade+0x900/0x900 [ 332.741579] ? lock_release+0xa10/0xa10 [ 332.745582] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.751048] ? usercopy_warn+0x110/0x110 [ 332.755143] __shmem_file_setup.part.50+0x83/0x2a0 [ 332.760101] shmem_file_setup+0x65/0x90 [ 332.764099] __x64_sys_memfd_create+0x2af/0x4f0 [ 332.768782] ? memfd_fcntl+0x1910/0x1910 [ 332.772866] do_syscall_64+0x1b9/0x820 [ 332.776766] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 332.782148] ? syscall_return_slowpath+0x5e0/0x5e0 [ 332.787098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.791962] ? trace_hardirqs_on_caller+0x310/0x310 [ 332.796997] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 332.802032] ? prepare_exit_to_usermode+0x291/0x3b0 [ 332.807083] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.811967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.817172] RIP: 0033:0x457569 17:48:57 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f00003ce000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000018f000/0x2000)=nil) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x200004e27, @rand_addr=0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x9}, 0x6) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 17:48:57 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:48:57 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1e9) 17:48:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x8000a0}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 332.820377] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.839294] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 332.839310] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 332.839319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 332.839327] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 332.839336] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f300fb3a6d4 [ 332.839345] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 17:48:58 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f00003ce000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000018f000/0x2000)=nil) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x200004e27, @rand_addr=0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x9}, 0x6) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) [ 332.895210] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x5000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:58 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:48:58 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x300) [ 333.019794] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:58 executing program 2 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xad00}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:58 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:48:58 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x8) [ 333.266856] FAULT_INJECTION: forcing a failure. [ 333.266856] name failslab, interval 1, probability 0, space 0, times 0 [ 333.325526] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 333.334130] CPU: 0 PID: 13133 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 333.342647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.352017] Call Trace: [ 333.354628] dump_stack+0x244/0x39d [ 333.358286] ? dump_stack_print_info.cold.1+0x20/0x20 [ 333.363513] should_fail.cold.4+0xa/0x17 [ 333.367710] ? fault_create_debugfs_attr+0x1f0/0x1f0 17:48:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x500}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:58 executing program 3: r0 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)="736d61707300be23d763bf090b7c3d129a54da8a181f3280d11a681a3834d4fdc4f46706f9e5d03d4b7b57d15963f3d6093e524c22c5662b258db94cc3771ae1c1c9c0ab1f2f0b8a22f0f0a0a9ebb567a2d6f1b2b30392fef62b1506773dea8fe2a4e385214deb26") sendfile(r0, r2, &(0x7f0000000000), 0x40000000009) [ 333.372870] ? __kernel_text_address+0xd/0x40 [ 333.377382] ? unwind_get_return_address+0x61/0xa0 [ 333.382342] ? find_held_lock+0x36/0x1c0 [ 333.386443] ? perf_trace_sched_process_exec+0x860/0x860 [ 333.391929] __should_failslab+0x124/0x180 [ 333.396181] should_failslab+0x9/0x14 [ 333.399998] kmem_cache_alloc+0x2be/0x730 [ 333.404161] ? mpol_shared_policy_init+0x235/0x650 [ 333.409104] ? current_time+0x72/0x1b0 [ 333.413016] __d_alloc+0xc8/0xb90 [ 333.416493] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 333.421523] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 333.426588] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 333.431799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.437795] ? timespec64_trunc+0xea/0x180 [ 333.442039] ? inode_init_owner+0x340/0x340 [ 333.446379] ? _raw_spin_unlock+0x2c/0x50 [ 333.450544] ? current_time+0x10b/0x1b0 [ 333.454542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.460106] ? __lockdep_init_map+0x105/0x590 [ 333.464615] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 333.470180] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 333.475737] d_alloc_pseudo+0x1d/0x30 [ 333.479567] alloc_file_pseudo+0x158/0x3f0 [ 333.483838] ? alloc_file+0x4d0/0x4d0 [ 333.487653] ? usercopy_warn+0x110/0x110 [ 333.491827] __shmem_file_setup.part.50+0x110/0x2a0 [ 333.496859] shmem_file_setup+0x65/0x90 [ 333.501018] __x64_sys_memfd_create+0x2af/0x4f0 [ 333.505699] ? memfd_fcntl+0x1910/0x1910 [ 333.509790] do_syscall_64+0x1b9/0x820 [ 333.513685] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 333.519075] ? syscall_return_slowpath+0x5e0/0x5e0 [ 333.524025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.528893] ? trace_hardirqs_on_caller+0x310/0x310 [ 333.533918] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 333.538945] ? prepare_exit_to_usermode+0x291/0x3b0 [ 333.543997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.548860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.554054] RIP: 0033:0x457569 [ 333.557254] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.576162] RSP: 002b:00007f300fb18a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 333.583877] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 333.591154] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 333.598431] RBP: 000000000072bfa0 R08: 0000000000100020 R09: 00000000fbad8001 [ 333.605720] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f300fb196d4 [ 333.612993] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 17:48:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x100000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:58 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x23) 17:48:58 executing program 1: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 333.684914] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x400000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:58 executing program 2 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:58 executing program 1: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:48:59 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x20000201) [ 333.926023] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:59 executing program 1: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x23) 17:48:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x1a0ffffffff}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 334.011600] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:48:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x100000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="6578743297", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x500000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:59 executing program 3 (fault-call:0 fault-nth:0): pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:48:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:48:59 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 334.478009] FAULT_INJECTION: forcing a failure. [ 334.478009] name failslab, interval 1, probability 0, space 0, times 0 [ 334.491395] CPU: 1 PID: 13194 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 334.499910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.509277] Call Trace: [ 334.511888] dump_stack+0x244/0x39d [ 334.515547] ? dump_stack_print_info.cold.1+0x20/0x20 [ 334.520788] should_fail.cold.4+0xa/0x17 [ 334.524910] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.530033] ? __kernel_text_address+0xd/0x40 [ 334.534564] ? unwind_get_return_address+0x61/0xa0 [ 334.539536] ? find_held_lock+0x36/0x1c0 [ 334.543646] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.549123] __should_failslab+0x124/0x180 [ 334.553393] should_failslab+0x9/0x14 [ 334.557210] kmem_cache_alloc+0x2be/0x730 [ 334.561372] ? mpol_shared_policy_init+0x235/0x650 [ 334.566798] ? current_time+0x72/0x1b0 [ 334.570708] __d_alloc+0xc8/0xb90 [ 334.574181] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 334.579213] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 334.584268] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 334.589473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.595020] ? timespec64_trunc+0xea/0x180 [ 334.599267] ? inode_init_owner+0x340/0x340 [ 334.603612] ? _raw_spin_unlock+0x2c/0x50 [ 334.607779] ? current_time+0x10b/0x1b0 [ 334.611768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.617321] ? __lockdep_init_map+0x105/0x590 [ 334.621836] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 334.627383] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 334.632944] d_alloc_pseudo+0x1d/0x30 [ 334.636763] alloc_file_pseudo+0x158/0x3f0 [ 334.641017] ? alloc_file+0x4d0/0x4d0 [ 334.644837] ? usercopy_warn+0x110/0x110 [ 334.648927] __shmem_file_setup.part.50+0x110/0x2a0 [ 334.653966] shmem_file_setup+0x65/0x90 [ 334.657959] __x64_sys_memfd_create+0x2af/0x4f0 [ 334.662643] ? memfd_fcntl+0x1910/0x1910 [ 334.666752] do_syscall_64+0x1b9/0x820 [ 334.670658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 334.676046] ? syscall_return_slowpath+0x5e0/0x5e0 [ 334.681012] ? trace_hardirqs_on_caller+0x310/0x310 [ 334.686044] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 334.691091] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 334.697771] ? __switch_to_asm+0x40/0x70 [ 334.701842] ? __switch_to_asm+0x34/0x70 [ 334.705922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.710788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.715989] RIP: 0033:0x457569 [ 334.719200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.738112] RSP: 002b:00007f300faf7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 334.745832] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 334.753109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 334.760388] RBP: 000000000072c040 R08: 0000000000100020 R09: 00000000fbad8001 [ 334.767667] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f300faf86d4 [ 334.774944] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 17:48:59 executing program 2 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:48:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x1000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:48:59 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x6) 17:48:59 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xc0000000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000480)={0x7, 0x4b, 0x1}, 0x7) linkat(r1, &(0x7f0000000400)='./file0\x00', r1, &(0x7f0000000600)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000240)={0x1dc3, 0x81}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200), &(0x7f00000002c0)=0xc) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r2, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x0, 0x400}, &(0x7f0000000080)=0xffffffffffffff89) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0x8) connect$rds(0xffffffffffffffff, &(0x7f0000000380), 0x10) recvmmsg(r2, &(0x7f0000000f00)=[{{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x1, 0x100, &(0x7f0000001000)={0x77359400}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @broadcast, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x61}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x2, @local, 0x0, 0x0, 'wlc\x00', 0x10, 0x0, 0x72}, 0x2c) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001080)=ANY=[], 0x0) ftruncate(r0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="660f3a177c564b0f019a27dbbaa000ec66b9800000c00f326635000400000f30360f01dfba6100b81bffef66b9910300000f3236876a0066b9800000c00f326635002000000f30f226260f01df", 0x4d}], 0x1, 0x0, &(0x7f00000000c0), 0x0) 17:48:59 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x4000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 334.921822] FAULT_INJECTION: forcing a failure. [ 334.921822] name failslab, interval 1, probability 0, space 0, times 0 [ 334.957691] CPU: 0 PID: 13244 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 334.966209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.975579] Call Trace: [ 334.978187] dump_stack+0x244/0x39d [ 334.981832] ? dump_stack_print_info.cold.1+0x20/0x20 [ 334.987036] ? __save_stack_trace+0x8d/0xf0 [ 334.991388] should_fail.cold.4+0xa/0x17 [ 334.995468] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.000600] ? save_stack+0x43/0xd0 [ 335.004242] ? kasan_kmalloc+0xc7/0xe0 [ 335.008159] ? percpu_ref_put_many+0x11c/0x260 [ 335.012756] ? zap_class+0x640/0x640 [ 335.016485] ? find_held_lock+0x36/0x1c0 [ 335.020595] ? perf_trace_sched_process_exec+0x860/0x860 [ 335.026063] ? lock_downgrade+0x900/0x900 [ 335.030231] __should_failslab+0x124/0x180 [ 335.034483] should_failslab+0x9/0x14 [ 335.038293] kmem_cache_alloc+0x2be/0x730 [ 335.042448] ? d_set_d_op+0x31d/0x410 [ 335.046273] __alloc_file+0xa8/0x470 [ 335.050002] ? file_free_rcu+0xd0/0xd0 [ 335.053903] ? d_instantiate+0x79/0xa0 [ 335.057804] ? lock_downgrade+0x900/0x900 [ 335.061974] ? kasan_check_read+0x11/0x20 [ 335.066131] ? do_raw_spin_unlock+0xa7/0x330 17:49:00 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 335.070571] ? do_raw_spin_trylock+0x270/0x270 [ 335.075175] alloc_empty_file+0x72/0x170 [ 335.078495] tls_set_device_offload_rx: netdev lo with no TLS offload [ 335.079252] alloc_file+0x5e/0x4d0 [ 335.079270] ? _raw_spin_unlock+0x2c/0x50 [ 335.079293] alloc_file_pseudo+0x261/0x3f0 [ 335.079315] ? alloc_file+0x4d0/0x4d0 [ 335.079335] ? usercopy_warn+0x110/0x110 [ 335.079367] __shmem_file_setup.part.50+0x110/0x2a0 [ 335.110819] shmem_file_setup+0x65/0x90 [ 335.114809] __x64_sys_memfd_create+0x2af/0x4f0 17:49:00 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xc0000000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000480)={0x7, 0x4b, 0x1}, 0x7) linkat(r1, &(0x7f0000000400)='./file0\x00', r1, &(0x7f0000000600)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000240)={0x1dc3, 0x81}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200), &(0x7f00000002c0)=0xc) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r2, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x0, 0x400}, &(0x7f0000000080)=0xffffffffffffff89) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0x8) connect$rds(0xffffffffffffffff, &(0x7f0000000380), 0x10) recvmmsg(r2, &(0x7f0000000f00)=[{{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x1, 0x100, &(0x7f0000001000)={0x77359400}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @broadcast, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x61}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x2, @local, 0x0, 0x0, 'wlc\x00', 0x10, 0x0, 0x72}, 0x2c) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001080)=ANY=[], 0x0) ftruncate(r0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="660f3a177c564b0f019a27dbbaa000ec66b9800000c00f326635000400000f30360f01dfba6100b81bffef66b9910300000f3236876a0066b9800000c00f326635002000000f30f226260f01df", 0x4d}], 0x1, 0x0, &(0x7f00000000c0), 0x0) [ 335.119491] ? memfd_fcntl+0x1910/0x1910 [ 335.123594] do_syscall_64+0x1b9/0x820 [ 335.127507] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 335.132891] ? syscall_return_slowpath+0x5e0/0x5e0 [ 335.137827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.142663] ? trace_hardirqs_on_caller+0x310/0x310 [ 335.147673] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 335.152678] ? prepare_exit_to_usermode+0x291/0x3b0 [ 335.157689] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.162525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.167700] RIP: 0033:0x457569 [ 335.170884] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.189779] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 335.197480] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 335.204754] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 335.212012] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 17:49:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:00 executing program 2 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 335.219269] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f300fb3a6d4 [ 335.226535] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 17:49:00 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0xfffffff0) 17:49:00 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x6}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 335.374709] FAULT_INJECTION: forcing a failure. [ 335.374709] name failslab, interval 1, probability 0, space 0, times 0 [ 335.401974] tls_set_device_offload_rx: netdev lo with no TLS offload [ 335.476914] CPU: 0 PID: 13267 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 335.485449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.494808] Call Trace: [ 335.497413] dump_stack+0x244/0x39d [ 335.501062] ? dump_stack_print_info.cold.1+0x20/0x20 [ 335.506269] ? find_held_lock+0x36/0x1c0 [ 335.510362] should_fail.cold.4+0xa/0x17 [ 335.514438] ? find_held_lock+0x36/0x1c0 [ 335.518518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.523684] ? lock_downgrade+0x900/0x900 [ 335.527842] ? current_time+0x72/0x1b0 [ 335.531765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.537343] ? timespec64_trunc+0xea/0x180 [ 335.541618] ? inode_init_owner+0x340/0x340 [ 335.545987] ? find_held_lock+0x36/0x1c0 [ 335.550068] ? __cast5_encrypt+0x1108/0x20d0 [ 335.554534] ? perf_trace_sched_process_exec+0x860/0x860 [ 335.560011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.565616] __should_failslab+0x124/0x180 [ 335.569873] should_failslab+0x9/0x14 [ 335.573691] kmem_cache_alloc+0x2be/0x730 [ 335.577856] ? do_sys_ftruncate+0x428/0x550 [ 335.582193] ? lock_downgrade+0x900/0x900 [ 335.586360] getname_flags+0xd0/0x590 [ 335.590176] ? __lock_is_held+0xb5/0x140 [ 335.594251] getname+0x19/0x20 [ 335.597458] do_sys_open+0x383/0x700 [ 335.601189] ? filp_open+0x80/0x80 [ 335.604748] ? trace_hardirqs_off_caller+0x300/0x300 [ 335.609867] ? do_sys_ftruncate+0x449/0x550 [ 335.614204] __x64_sys_open+0x7e/0xc0 [ 335.618023] do_syscall_64+0x1b9/0x820 [ 335.621921] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 335.627299] ? syscall_return_slowpath+0x5e0/0x5e0 [ 335.632238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.637100] ? trace_hardirqs_on_caller+0x310/0x310 [ 335.642130] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 335.647179] ? prepare_exit_to_usermode+0x291/0x3b0 [ 335.652218] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.657085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.662283] RIP: 0033:0x4111a1 [ 335.665490] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 335.684399] RSP: 002b:00007f300fb39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 335.692114] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 335.699387] RDX: 00007f300fb39afa RSI: 0000000000000002 RDI: 00007f300fb39af0 [ 335.706662] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 335.713949] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 17:49:00 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:00 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xc0000000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000480)={0x7, 0x4b, 0x1}, 0x7) linkat(r1, &(0x7f0000000400)='./file0\x00', r1, &(0x7f0000000600)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000240)={0x1dc3, 0x81}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200), &(0x7f00000002c0)=0xc) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r2, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x0, 0x400}, &(0x7f0000000080)=0xffffffffffffff89) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0x8) connect$rds(0xffffffffffffffff, &(0x7f0000000380), 0x10) recvmmsg(r2, &(0x7f0000000f00)=[{{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x1, 0x100, &(0x7f0000001000)={0x77359400}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @broadcast, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x61}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x2, @local, 0x0, 0x0, 'wlc\x00', 0x10, 0x0, 0x72}, 0x2c) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001080)=ANY=[], 0x0) ftruncate(r0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="660f3a177c564b0f019a27dbbaa000ec66b9800000c00f326635000400000f30360f01dfba6100b81bffef66b9910300000f3236876a0066b9800000c00f326635002000000f30f226260f01df", 0x4d}], 0x1, 0x0, &(0x7f00000000c0), 0x0) [ 335.721227] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:00 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xffffffffa0010000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 335.864468] tls_set_device_offload_rx: netdev lo with no TLS offload 17:49:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x1, 0x246c) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000180)=0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x8000000000000, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) mknod$loop(&(0x7f0000000480)='./file0\x00', 0x6000, 0x0) unlink(&(0x7f0000000240)='./file0/file0\x00') r2 = syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x80040) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000005c0)={0x1, {0x0, 0x6, 0xa418, 0x128, 0xc08, 0x1000}}) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000040000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) mount(&(0x7f00000002c0)=@filename='./file0/file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='sysv\x00', 0x10000, &(0x7f0000000380)='fuse\x00') 17:49:01 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:01 executing program 2 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x600000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 336.179224] FAULT_INJECTION: forcing a failure. [ 336.179224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.191091] CPU: 1 PID: 13325 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 336.199595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.208952] Call Trace: [ 336.211578] dump_stack+0x244/0x39d [ 336.215267] ? dump_stack_print_info.cold.1+0x20/0x20 [ 336.220499] should_fail.cold.4+0xa/0x17 [ 336.224593] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.229720] ? print_usage_bug+0xc0/0xc0 [ 336.233812] ? mark_held_locks+0x130/0x130 [ 336.238096] ? zap_class+0x640/0x640 [ 336.241830] ? print_usage_bug+0xc0/0xc0 [ 336.245924] ? zap_class+0x640/0x640 [ 336.249678] ? lock_downgrade+0x900/0x900 [ 336.253839] ? check_preemption_disabled+0x48/0x280 [ 336.258911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.264464] ? should_fail+0x22d/0xd01 [ 336.268365] ? find_held_lock+0x36/0x1c0 [ 336.272444] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.277581] __alloc_pages_nodemask+0x34b/0xdd0 [ 336.282261] ? current_time+0x72/0x1b0 [ 336.286173] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 336.291210] ? inode_init_owner+0x340/0x340 [ 336.295561] ? find_held_lock+0x36/0x1c0 [ 336.299667] ? trace_hardirqs_off+0xb8/0x310 [ 336.304104] cache_grow_begin+0xa5/0x8c0 [ 336.308180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.313744] kmem_cache_alloc+0x66b/0x730 [ 336.317905] ? do_sys_ftruncate+0x428/0x550 [ 336.322277] getname_flags+0xd0/0x590 [ 336.326091] ? __lock_is_held+0xb5/0x140 [ 336.330164] getname+0x19/0x20 [ 336.333368] do_sys_open+0x383/0x700 [ 336.337104] ? filp_open+0x80/0x80 [ 336.340659] ? trace_hardirqs_off_caller+0x300/0x300 [ 336.345775] ? do_sys_ftruncate+0x449/0x550 [ 336.350120] __x64_sys_open+0x7e/0xc0 [ 336.353936] do_syscall_64+0x1b9/0x820 [ 336.357835] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 336.363217] ? syscall_return_slowpath+0x5e0/0x5e0 [ 336.368157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.373013] ? trace_hardirqs_on_caller+0x310/0x310 [ 336.378037] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 336.378056] ? prepare_exit_to_usermode+0x291/0x3b0 [ 336.378088] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.378110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.398149] RIP: 0033:0x4111a1 [ 336.401355] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 336.420281] RSP: 002b:00007f300fb39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 336.420298] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 336.420308] RDX: 00007f300fb39afa RSI: 0000000000000002 RDI: 00007f300fb39af0 [ 336.420317] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 336.420326] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 336.420335] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 336.467431] kauditd_printk_skb: 11 callbacks suppressed [ 336.467446] audit: type=1804 audit(1539712141.525:355): pid=13328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/230/file0" dev="sda1" ino=16854 res=1 [ 336.497936] audit: type=1804 audit(1539712141.525:356): pid=13329 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/230/file0" dev="sda1" ino=16854 res=1 17:49:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x600}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:01 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5473, &(0x7f0000000100)=0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000700000000000019078ac1414bbac1414110404907800000000450000000000000000040000ac1414aaac140100000000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], &(0x7f0000000000)) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, 0x5}, 0x10) 17:49:01 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:01 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000240)={0x2, 0x80000000, 0x1, 'queue1\x00', 0x1ff}) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0x9a74000000000000, 0x0, 0x7, 0x5, 0x5, 0x5, {0x0, @in={{0x2, 0x4e22, @remote}}, 0x7, 0x0, 0x0, 0x281, 0x9}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)={r1, 0x97, "aa77bfb3102b2091875221b892b38c8d059f1b769f4201800d1685e204f46e33b60eec12f86498357d1e78a08136b078761c2274b6ab89a4df7a5e160bdc0d8f969dd10410b3278ca1c1166da053d2cea3e8ef9352c81b1be91c15b08b027f2f2a2bc26b2798a2815f348f532b8949cef00ad99a2d035f3f6872bc4df0b98daf62073f8b6123773c1bfc58a151e11c84b9c3adad386e5a"}, &(0x7f00000001c0)=0x9f) fchdir(0xffffffffffffffff) r2 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x0) fdatasync(r0) 17:49:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 336.530723] EXT4-fs: 9 callbacks suppressed [ 336.530735] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:49:01 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:01 executing program 2 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 336.615028] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x300}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:01 executing program 1: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@loopback}) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040)={0xa, 0x2, 0x40, 0x2}, 0xa) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640), 0xc) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x5}}, 0x6, 0x0, 0x100000001, 0xc336, 0xd}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x800}, 0x8) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) recvmmsg(r1, &(0x7f0000004880)=[{{&(0x7f0000000280)=@can, 0x80, &(0x7f0000000900)=[{&(0x7f00000004c0)=""/222, 0xde}, {&(0x7f0000000680)=""/97, 0x61}, {&(0x7f0000000700)=""/219, 0xdb}, {&(0x7f0000000800)=""/86, 0x56}, {&(0x7f0000000880)=""/109, 0x6d}], 0x5, &(0x7f0000000980)=""/159, 0x9f, 0xffffffff}, 0xfffffffffffffff9}, {{&(0x7f0000000a40)=@rc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000ac0)=""/146, 0x92}, {&(0x7f0000000180)=""/7, 0x7}], 0x2, 0x0, 0x0, 0x8}, 0xadc0}, {{&(0x7f0000000b80)=@hci, 0x80, &(0x7f0000000380)=[{&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)=""/223, 0xdf}, {&(0x7f0000000dc0)=""/188, 0xbc}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x4, &(0x7f00000005c0)=""/35, 0x23, 0x800}, 0x2}, {{&(0x7f0000001e80)=@ipx, 0x80, &(0x7f00000022c0)=[{&(0x7f0000001f00)=""/108, 0x6c}, {&(0x7f0000001f80)=""/182, 0xb6}, {&(0x7f0000002040)=""/130, 0x82}, {&(0x7f0000002100)=""/211, 0xd3}, {&(0x7f0000002200)=""/162, 0xa2}], 0x5, 0x0, 0x0, 0x400}, 0x100}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000002340)=""/117, 0x75}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/131, 0x83}], 0x3, &(0x7f00000034c0)=""/21, 0x15, 0x6}, 0x4}, {{0x0, 0x0, &(0x7f0000003500), 0x0, &(0x7f0000003540)=""/4096, 0x1000, 0x9}, 0x7}, {{&(0x7f0000004540)=@can, 0x80, &(0x7f0000004800)=[{&(0x7f00000045c0)=""/153, 0x99}, {&(0x7f0000004680)=""/213, 0xd5}, {&(0x7f0000004780)=""/31, 0x1f}, {&(0x7f00000047c0)=""/36, 0x24}], 0x4, &(0x7f0000004840)=""/38, 0x26}, 0x7}], 0x7, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)) epoll_create1(0x80000) [ 336.716230] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 336.776484] FAULT_INJECTION: forcing a failure. [ 336.776484] name failslab, interval 1, probability 0, space 0, times 0 [ 336.791705] CPU: 1 PID: 13360 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 336.800221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.809585] Call Trace: [ 336.812194] dump_stack+0x244/0x39d [ 336.815850] ? dump_stack_print_info.cold.1+0x20/0x20 [ 336.821056] ? print_usage_bug+0xc0/0xc0 [ 336.825154] should_fail.cold.4+0xa/0x17 [ 336.829230] ? find_held_lock+0x36/0x1c0 [ 336.833314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.838442] ? lock_downgrade+0x900/0x900 [ 336.842602] ? check_preemption_disabled+0x48/0x280 [ 336.847640] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 336.852591] ? kasan_check_read+0x11/0x20 [ 336.855028] tls_set_device_offload_rx: netdev lo with no TLS offload [ 336.856763] ? find_held_lock+0x36/0x1c0 [ 336.856801] ? perf_trace_sched_process_exec+0x860/0x860 [ 336.872816] __should_failslab+0x124/0x180 17:49:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x100000a, 0x32, 0xffffffffffffffff, 0x0) ioctl(r1, 0x1, &(0x7f0000000000)) 17:49:01 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432f8", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 336.877087] should_failslab+0x9/0x14 [ 336.880897] kmem_cache_alloc+0x2be/0x730 [ 336.885055] ? zap_class+0x640/0x640 [ 336.888816] ? print_usage_bug+0xc0/0xc0 [ 336.892895] ? mark_held_locks+0x130/0x130 [ 336.897153] __alloc_file+0xa8/0x470 [ 336.900886] ? file_free_rcu+0xd0/0xd0 [ 336.904794] ? find_held_lock+0x36/0x1c0 [ 336.908880] ? is_bpf_text_address+0xac/0x170 [ 336.913379] ? lock_downgrade+0x900/0x900 [ 336.917515] ? check_preemption_disabled+0x48/0x280 [ 336.922524] alloc_empty_file+0x72/0x170 [ 336.926592] path_openat+0x170/0x5150 [ 336.930395] ? rcu_softirq_qs+0x20/0x20 [ 336.934351] ? unwind_dump+0x190/0x190 [ 336.938231] ? zap_class+0x640/0x640 [ 336.941933] ? path_lookupat.isra.43+0xc00/0xc00 [ 336.946673] ? unwind_get_return_address+0x61/0xa0 [ 336.951598] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 336.956613] ? expand_files.part.8+0x571/0x9a0 [ 336.961188] ? find_held_lock+0x36/0x1c0 [ 336.965243] ? __alloc_fd+0x347/0x6e0 [ 336.969033] ? lock_downgrade+0x900/0x900 [ 336.973169] ? getname+0x19/0x20 [ 336.976529] ? kasan_check_read+0x11/0x20 [ 336.980683] ? do_raw_spin_unlock+0xa7/0x330 [ 336.985092] ? do_raw_spin_trylock+0x270/0x270 [ 336.989661] ? __lock_is_held+0xb5/0x140 [ 336.993709] ? __check_object_size+0xb1/0x782 [ 336.998198] ? _raw_spin_unlock+0x2c/0x50 [ 337.002330] ? __alloc_fd+0x347/0x6e0 [ 337.006124] do_filp_open+0x255/0x380 [ 337.010087] ? may_open_dev+0x100/0x100 [ 337.014056] ? get_unused_fd_flags+0x122/0x1a0 [ 337.018629] ? __alloc_fd+0x6e0/0x6e0 [ 337.022415] ? __lock_is_held+0xb5/0x140 [ 337.026469] do_sys_open+0x568/0x700 [ 337.030174] ? filp_open+0x80/0x80 [ 337.033705] ? trace_hardirqs_off_caller+0x300/0x300 [ 337.038794] ? do_sys_ftruncate+0x449/0x550 [ 337.043103] __x64_sys_open+0x7e/0xc0 [ 337.046892] do_syscall_64+0x1b9/0x820 [ 337.050769] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 337.056120] ? syscall_return_slowpath+0x5e0/0x5e0 [ 337.061036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.065866] ? trace_hardirqs_on_caller+0x310/0x310 [ 337.070869] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 337.075886] ? prepare_exit_to_usermode+0x291/0x3b0 [ 337.080892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.085725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.090898] RIP: 0033:0x4111a1 [ 337.094082] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 337.112981] RSP: 002b:00007f300fb39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 337.120676] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 17:49:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x4}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:02 executing program 2 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 337.127931] RDX: 00007f300fb39afa RSI: 0000000000000002 RDI: 00007f300fb39af0 [ 337.135215] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 337.142469] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 337.149733] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:02 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 337.266980] audit: type=1804 audit(1539712142.335:357): pid=13379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/231/file0" dev="sda1" ino=16886 res=1 [ 337.290774] FAULT_INJECTION: forcing a failure. [ 337.290774] name failslab, interval 1, probability 0, space 0, times 0 [ 337.338764] audit: type=1804 audit(1539712142.375:358): pid=13379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/231/file0" dev="sda1" ino=16886 res=1 [ 337.354824] CPU: 0 PID: 13380 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 337.370606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.370617] Call Trace: [ 337.382582] dump_stack+0x244/0x39d [ 337.386240] ? dump_stack_print_info.cold.1+0x20/0x20 [ 337.391492] ? lock_downgrade+0x900/0x900 [ 337.395667] ? check_preemption_disabled+0x48/0x280 [ 337.395697] should_fail.cold.4+0xa/0x17 [ 337.404749] ? rcu_softirq_qs+0x20/0x20 [ 337.408745] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.413875] ? is_bpf_text_address+0xd3/0x170 [ 337.418391] ? kernel_text_address+0x79/0xf0 [ 337.418409] ? __kernel_text_address+0xd/0x40 [ 337.418425] ? unwind_get_return_address+0x61/0xa0 [ 337.418444] ? __save_stack_trace+0x8d/0xf0 [ 337.418464] ? find_held_lock+0x36/0x1c0 [ 337.432294] ? do_syscall_64+0x1b9/0x820 [ 337.444700] ? perf_trace_sched_process_exec+0x860/0x860 [ 337.450176] __should_failslab+0x124/0x180 [ 337.454446] should_failslab+0x9/0x14 [ 337.458264] kmem_cache_alloc_trace+0x2d7/0x750 [ 337.462952] ? __might_sleep+0x95/0x190 [ 337.466947] apparmor_file_alloc_security+0x17b/0xac0 [ 337.472172] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 337.477758] ? apparmor_path_rename+0xcd0/0xcd0 [ 337.482449] ? rcu_read_lock_sched_held+0x14f/0x180 [ 337.487490] ? kmem_cache_alloc+0x33a/0x730 [ 337.491825] ? zap_class+0x640/0x640 [ 337.495579] security_file_alloc+0x4c/0xa0 [ 337.499838] __alloc_file+0x12a/0x470 [ 337.503694] ? file_free_rcu+0xd0/0xd0 [ 337.507661] ? find_held_lock+0x36/0x1c0 [ 337.511746] ? is_bpf_text_address+0xac/0x170 [ 337.516256] ? lock_downgrade+0x900/0x900 [ 337.520413] ? check_preemption_disabled+0x48/0x280 [ 337.525450] alloc_empty_file+0x72/0x170 [ 337.529531] path_openat+0x170/0x5150 [ 337.533366] ? rcu_softirq_qs+0x20/0x20 [ 337.537349] ? unwind_dump+0x190/0x190 [ 337.541260] ? zap_class+0x640/0x640 [ 337.545001] ? path_lookupat.isra.43+0xc00/0xc00 [ 337.549765] ? unwind_get_return_address+0x61/0xa0 [ 337.554715] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 337.559747] ? expand_files.part.8+0x571/0x9a0 [ 337.564353] ? find_held_lock+0x36/0x1c0 [ 337.568439] ? __alloc_fd+0x347/0x6e0 [ 337.572258] ? lock_downgrade+0x900/0x900 [ 337.576421] ? getname+0x19/0x20 [ 337.579841] ? kasan_check_read+0x11/0x20 [ 337.583999] ? do_raw_spin_unlock+0xa7/0x330 17:49:02 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)=0x2) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x100, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="025ff9413e7e73f8146f0d1392d8a08eb129e4209599832d0ff83b3a9dfa0b2d56faae7c0b8fc79b3e83c0c5690290d18916c0210c37786c9314505fbb3f1df73d83d76393493626500f838c7dda03c6942d5eaa8a02abe05ff51c83680e4c32174b241360a891c3b66e7e8f099499e987eec77fe58c109c832ef594241c9053480be03f8bf9f8fae34764d04ee42626f58a346e56f2d749e60feb5f82f8a5f3e85a1921f0c60ac95ecfe186b7871114b7a651d940862cac2110d1a9296d87ccf62035d863302a90e5dd11b8a5aee62efa3e3ac0ab2708342662e224a4c1dffa7db1822006dbabd43f92268a17533b80c62423032f920be8"], 0x1) 17:49:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x700000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:02 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r0, 0x10e, 0x8000000009, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0xfead) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xb96}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000000, 0x7, 0x1, 0x6b996322}, 0x14) 17:49:02 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) clock_getres(0x0, &(0x7f0000000140)) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x7) poll(&(0x7f0000000180), 0x0, 0x7) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="f2e200"], 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000100)={'syzkaller1\x00', {0x2, 0x4e23, @multicast1}}) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x1) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x8) 17:49:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xa0008000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 337.588418] ? do_raw_spin_trylock+0x270/0x270 [ 337.593028] ? __lock_is_held+0xb5/0x140 [ 337.597099] ? __check_object_size+0xb1/0x782 [ 337.601640] ? _raw_spin_unlock+0x2c/0x50 [ 337.605799] ? __alloc_fd+0x347/0x6e0 [ 337.609630] do_filp_open+0x255/0x380 [ 337.613471] ? may_open_dev+0x100/0x100 [ 337.617478] ? get_unused_fd_flags+0x122/0x1a0 [ 337.622072] ? __alloc_fd+0x6e0/0x6e0 [ 337.625884] ? __lock_is_held+0xb5/0x140 [ 337.629974] do_sys_open+0x568/0x700 [ 337.633723] ? filp_open+0x80/0x80 [ 337.637278] ? trace_hardirqs_off_caller+0x300/0x300 [ 337.642393] ? do_sys_ftruncate+0x449/0x550 [ 337.646729] __x64_sys_open+0x7e/0xc0 [ 337.646751] do_syscall_64+0x1b9/0x820 [ 337.646767] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 337.646787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 337.659822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.659843] ? trace_hardirqs_on_caller+0x310/0x310 [ 337.659862] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 337.659887] ? prepare_exit_to_usermode+0x291/0x3b0 [ 337.684696] ? trace_hardirqs_off_thunk+0x1a/0x1c 17:49:02 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x1ff, &(0x7f0000000180), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4001, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000040)=@profile={'permprofile ', ':!#:keyringselfeth0ppp0%+ppp1\x00'}, 0x2a) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) pwrite64(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0xc) [ 337.689582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.694782] RIP: 0033:0x4111a1 [ 337.697988] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 337.716905] RSP: 002b:00007f300fb39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 337.724634] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 337.731918] RDX: 00007f300fb39afa RSI: 0000000000000002 RDI: 00007f300fb39af0 17:49:02 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 337.739191] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 337.739201] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 337.739209] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 337.810163] audit: type=1804 audit(1539712142.885:359): pid=13405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/233/file0" dev="sda1" ino=16833 res=1 [ 337.870776] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 337.899895] audit: type=1804 audit(1539712142.915:360): pid=13405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/233/file0" dev="sda1" ino=16833 res=1 [ 337.970245] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:03 executing program 2 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x6000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x1ff, &(0x7f0000000180), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4001, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000040)=@profile={'permprofile ', ':!#:keyringselfeth0ppp0%+ppp1\x00'}, 0x2a) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) pwrite64(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0xc) 17:49:03 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x80000001, &(0x7f0000000040)=0x2) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:03 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 338.004480] audit: type=1400 audit(1539712142.935:361): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=":!#:keyringselfeth0ppp0%+ppp1" pid=13411 comm="syz-executor1" 17:49:03 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syncfs(r0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d4ada255f8994ccfb2eb4cc0e137ef420bac6996d510745084077ed9c8153a1722ee1f3e966aba4eb144f19376e539d173d9e8b4cfab43333b00000000000000000000000000004cc8598c316aefecb8899ab7ee4cd832f5a58486a6931bb453ebf301e5544355e12bb4e6cf9845b7b76bbeb57b4b4375509a94e09edd112810a45ab2db45ec48cfc5ca7f26e624c3b4c1b9967dffbd540961efeae81cd7a3f799452eae2b"], 0x1) 17:49:03 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 338.097086] audit: type=1804 audit(1539712143.165:362): pid=13434 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/234/file0" dev="sda1" ino=16893 res=1 [ 338.103116] FAULT_INJECTION: forcing a failure. [ 338.103116] name failslab, interval 1, probability 0, space 0, times 0 17:49:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x7000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 338.195837] audit: type=1804 audit(1539712143.195:363): pid=13440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/234/file0" dev="sda1" ino=16893 res=1 [ 338.244259] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 338.249016] CPU: 0 PID: 13438 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 338.261103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.270465] Call Trace: [ 338.273064] dump_stack+0x244/0x39d [ 338.276711] ? dump_stack_print_info.cold.1+0x20/0x20 [ 338.281914] ? lock_downgrade+0x900/0x900 [ 338.286078] ? check_preemption_disabled+0x48/0x280 [ 338.291136] should_fail.cold.4+0xa/0x17 [ 338.295233] ? rcu_softirq_qs+0x20/0x20 [ 338.299230] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.304358] ? is_bpf_text_address+0xd3/0x170 [ 338.308872] ? kernel_text_address+0x79/0xf0 [ 338.313296] ? __kernel_text_address+0xd/0x40 [ 338.317804] ? unwind_get_return_address+0x61/0xa0 [ 338.317861] audit: type=1804 audit(1539712143.395:364): pid=13453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/235/file0" dev="sda1" ino=16888 res=1 [ 338.322752] ? __save_stack_trace+0x8d/0xf0 [ 338.322776] ? find_held_lock+0x36/0x1c0 [ 338.322817] ? do_syscall_64+0x1b9/0x820 [ 338.322837] ? perf_trace_sched_process_exec+0x860/0x860 [ 338.364611] __should_failslab+0x124/0x180 [ 338.368860] should_failslab+0x9/0x14 [ 338.372669] kmem_cache_alloc_trace+0x2d7/0x750 [ 338.377345] ? __might_sleep+0x95/0x190 [ 338.381338] apparmor_file_alloc_security+0x17b/0xac0 [ 338.386537] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 338.392103] ? apparmor_path_rename+0xcd0/0xcd0 [ 338.396793] ? rcu_read_lock_sched_held+0x14f/0x180 [ 338.401816] ? kmem_cache_alloc+0x33a/0x730 [ 338.406143] ? zap_class+0x640/0x640 [ 338.409871] security_file_alloc+0x4c/0xa0 [ 338.414119] __alloc_file+0x12a/0x470 [ 338.417931] ? file_free_rcu+0xd0/0xd0 [ 338.421831] ? find_held_lock+0x36/0x1c0 [ 338.425908] ? is_bpf_text_address+0xac/0x170 [ 338.430414] ? lock_downgrade+0x900/0x900 [ 338.435015] ? check_preemption_disabled+0x48/0x280 [ 338.440049] alloc_empty_file+0x72/0x170 [ 338.444119] path_openat+0x170/0x5150 [ 338.447926] ? rcu_softirq_qs+0x20/0x20 [ 338.451903] ? unwind_dump+0x190/0x190 [ 338.455838] ? zap_class+0x640/0x640 [ 338.459607] ? path_lookupat.isra.43+0xc00/0xc00 [ 338.464367] ? unwind_get_return_address+0x61/0xa0 [ 338.469306] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 338.474333] ? expand_files.part.8+0x571/0x9a0 [ 338.478931] ? find_held_lock+0x36/0x1c0 [ 338.483007] ? __alloc_fd+0x347/0x6e0 [ 338.486815] ? lock_downgrade+0x900/0x900 [ 338.490963] ? getname+0x19/0x20 [ 338.494346] ? kasan_check_read+0x11/0x20 [ 338.498500] ? do_raw_spin_unlock+0xa7/0x330 [ 338.502912] ? do_raw_spin_trylock+0x270/0x270 [ 338.507518] ? __lock_is_held+0xb5/0x140 [ 338.511596] ? __check_object_size+0xb1/0x782 [ 338.516109] ? _raw_spin_unlock+0x2c/0x50 [ 338.520266] ? __alloc_fd+0x347/0x6e0 [ 338.524091] do_filp_open+0x255/0x380 [ 338.527902] ? may_open_dev+0x100/0x100 [ 338.531899] ? get_unused_fd_flags+0x122/0x1a0 [ 338.536486] ? __alloc_fd+0x6e0/0x6e0 [ 338.540293] ? __lock_is_held+0xb5/0x140 [ 338.544364] do_sys_open+0x568/0x700 [ 338.548089] ? filp_open+0x80/0x80 [ 338.551642] ? trace_hardirqs_off_caller+0x300/0x300 [ 338.556747] ? do_sys_ftruncate+0x449/0x550 [ 338.561080] __x64_sys_open+0x7e/0xc0 [ 338.565005] do_syscall_64+0x1b9/0x820 [ 338.568901] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 338.574273] ? syscall_return_slowpath+0x5e0/0x5e0 [ 338.579222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.584112] ? trace_hardirqs_on_caller+0x310/0x310 [ 338.589132] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 338.594170] ? prepare_exit_to_usermode+0x291/0x3b0 [ 338.599199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.604051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.609244] RIP: 0033:0x4111a1 [ 338.612488] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 338.631392] RSP: 002b:00007f300fb39a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 17:49:03 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:03 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'veth1_to_bond\x00', {0x2, 0x4e22, @remote}}) r1 = socket$kcm(0x11, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x2, {0x0, 0x1, 0x1}}, 0x14) r2 = memfd_create(&(0x7f0000000180)='\x00', 0x6) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000a00)}, 0x20000002) r3 = epoll_create(0x3) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000300)=0xfffffffffffffe62) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) fcntl$setown(r1, 0x8, r4) r5 = getegid() ioctl$TUNSETGROUP(r0, 0x400454ce, r5) fcntl$getownex(r3, 0x10, &(0x7f00000001c0)) write$P9_RVERSION(r0, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x572, 0x8, '9P2000.u'}, 0x15) 17:49:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x700}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 338.639101] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 338.646369] RDX: 00007f300fb39afa RSI: 0000000000000002 RDI: 00007f300fb39af0 [ 338.653638] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 338.660904] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 338.668168] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:03 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x200000000000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") prctl$setname(0xf, &(0x7f00000001c0)='(keyring^self]/GPL6\x00') openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x1735}, 0x8) [ 338.813117] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:03 executing program 2 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:03 executing program 4: r0 = open(&(0x7f0000001640)='./file0\x00', 0x0, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)={&(0x7f0000001680)='./file0\x00', 0x0, 0x8}, 0x10) bind$inet(r0, &(0x7f00000005c0)={0x2, 0x4e21, @remote}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000001900)='/dev/ppp\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "2b6eac34d00eb49916988bcd49257ca85eab7ac9d4d2539b684b34f44f9d424ed35b334dda7956682a00fa7281d282216ac7523740eb8b1fe95b513f6827c3a7cb1ca1bbfe5330e8decfe499a2266e21378aba7e1af64308a70292bcca80f93c3b033b76f450a72afa142f6597f5790817b62472c72b2aff6653103ae4b98c79dcdf"}, 0x86) fchdir(0xffffffffffffffff) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000017c0)={@alg={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, {&(0x7f00000016c0)=""/145, 0x91}, &(0x7f0000000600), 0x1a}, 0xa0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x100000001}, 0x1c) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x26) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000000c0)=@nl, 0x80, &(0x7f0000000500)=[{&(0x7f0000000140)=""/10, 0xa}, {&(0x7f0000000180)=""/52, 0x34}, {&(0x7f0000000240)=""/149, 0x95}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f00000001c0)=""/64, 0x40}, {&(0x7f0000000400)=""/200, 0xc8}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0xffff}, 0x10000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='$'], 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000001780)={0x2, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000001880)={0x5, r5}) 17:49:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xa0010000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:04 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:04 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) mq_unlink(&(0x7f0000000200)='@vmnet0eth0{\x00') ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) write(0xffffffffffffffff, &(0x7f0000000100)="220000002000070700be00000900070102000040000000000020000005001380", 0x20) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 339.002476] FAULT_INJECTION: forcing a failure. [ 339.002476] name failslab, interval 1, probability 0, space 0, times 0 17:49:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x5}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 339.083585] CPU: 1 PID: 13494 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 339.092149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.092156] Call Trace: [ 339.092183] dump_stack+0x244/0x39d [ 339.092211] ? dump_stack_print_info.cold.1+0x20/0x20 [ 339.092231] ? cpuacct_charge+0x265/0x440 [ 339.092266] should_fail.cold.4+0xa/0x17 [ 339.092291] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.092307] ? __lock_is_held+0xb5/0x140 [ 339.092336] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 339.092355] ? zap_class+0x640/0x640 [ 339.092379] ? rcu_softirq_qs+0x20/0x20 [ 339.135385] ? print_usage_bug+0xc0/0xc0 [ 339.143059] ? __account_cfs_rq_runtime+0x790/0x790 [ 339.143092] ? find_held_lock+0x36/0x1c0 [ 339.156213] ? __lock_is_held+0xb5/0x140 [ 339.160307] ? perf_trace_sched_process_exec+0x860/0x860 [ 339.165783] __should_failslab+0x124/0x180 [ 339.165806] should_failslab+0x9/0x14 [ 339.165823] kmem_cache_alloc+0x2be/0x730 [ 339.165845] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 339.165867] __kernfs_new_node+0x127/0x8d0 [ 339.178153] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 339.178191] ? zap_class+0x640/0x640 [ 339.178207] ? print_usage_bug+0xc0/0xc0 [ 339.178228] ? zap_class+0x640/0x640 [ 339.203681] ? trace_hardirqs_on+0xbd/0x310 [ 339.208019] ? kasan_check_read+0x11/0x20 [ 339.212278] ? find_held_lock+0x36/0x1c0 [ 339.216367] kernfs_new_node+0x95/0x120 [ 339.220363] kernfs_create_dir_ns+0x4d/0x160 [ 339.224793] internal_create_group+0x5fc/0xd80 [ 339.229402] ? remove_files.isra.1+0x190/0x190 [ 339.233993] ? up_write+0x7b/0x220 [ 339.237550] ? down_write_nested+0x130/0x130 [ 339.242005] ? down_read+0x120/0x120 [ 339.245751] sysfs_create_group+0x1f/0x30 [ 339.249922] lo_ioctl+0x1307/0x1d60 [ 339.253578] ? lo_rw_aio+0x1ef0/0x1ef0 [ 339.253600] blkdev_ioctl+0x9ac/0x2010 [ 339.253621] ? blkpg_ioctl+0xc10/0xc10 [ 339.253636] ? lock_downgrade+0x900/0x900 [ 339.253655] ? check_preemption_disabled+0x48/0x280 [ 339.265317] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 339.265335] ? kasan_check_read+0x11/0x20 [ 339.265354] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 339.265373] ? rcu_softirq_qs+0x20/0x20 [ 339.265401] ? __fget+0x4d1/0x740 [ 339.296307] ? ksys_dup3+0x680/0x680 [ 339.300051] block_ioctl+0xee/0x130 [ 339.303702] ? blkdev_fallocate+0x400/0x400 [ 339.308052] do_vfs_ioctl+0x1de/0x1720 [ 339.311967] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 339.317518] ? ioctl_preallocate+0x300/0x300 [ 339.317535] ? __fget_light+0x2e9/0x430 [ 339.317562] ? fget_raw+0x20/0x20 [ 339.329392] ? rcu_read_lock_sched_held+0x14f/0x180 17:49:04 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:04 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 339.334425] ? kmem_cache_free+0x24f/0x290 [ 339.338671] ? putname+0xf7/0x130 [ 339.338692] ? do_syscall_64+0x9a/0x820 [ 339.338709] ? do_syscall_64+0x9a/0x820 [ 339.338726] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 339.338747] ? security_file_ioctl+0x94/0xc0 [ 339.338766] ksys_ioctl+0xa9/0xd0 [ 339.338794] __x64_sys_ioctl+0x73/0xb0 [ 339.366524] do_syscall_64+0x1b9/0x820 [ 339.370438] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 339.375819] ? syscall_return_slowpath+0x5e0/0x5e0 [ 339.380762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.385624] ? trace_hardirqs_on_caller+0x310/0x310 [ 339.390663] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 339.395694] ? prepare_exit_to_usermode+0x291/0x3b0 [ 339.400732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.400759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.400772] RIP: 0033:0x4573d7 [ 339.400790] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.400799] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.400814] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 339.400828] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.410854] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 339.410863] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 339.410872] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 339.414281] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 339.484539] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 339.544207] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xad}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:04 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:04 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x5, &(0x7f0000000100)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x1000000, 0x1103, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000300)={@local, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)) r3 = gettid() getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x2}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @multicast2}}, [0x3, 0x1, 0xffffffffffffbc4c, 0x6, 0x3, 0x7, 0x0, 0x0, 0x3, 0xffff, 0x0, 0x0, 0x8000, 0x0, 0xc9a5]}, &(0x7f0000000440)=0x100) r4 = getpgid(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r6 = dup2(r5, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[]}}, 0x44801) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ptrace$setregs(0xf, r4, 0xfffffffffffff75b, &(0x7f00000007c0)="d129cbb4da7a743a734ab0b4d16acbdc4749c6fe449fb0c49d70cb853be8efe523c4fb9f720436386167b199a06e1f38e64040705845548091450372251e2590e9c2865f58c36783f5b62dfd10d82b2cd59c92a1a0a59ea02346e62a2083470a18e5a959c878d278709f0d0ee5d41dc40a98c6d26dab85d2d9b59caf9013f6924273d44b28d181499d64fcdb03e3edb4ba15f090abeeb64f6eebee842ef36183124337d01e9425246735f526db1fff1cb6e9e0adb4187fa214e70342ae28cd61690fcf70d74ef63ed47ccc7f086ae33bd3808f7e58b04fe8d3a8ce4a15399a425a967a2b9cb9080ad7270b9acd058301689b7c9f6d2e8f5f59cf9a30f7fa1361ed5847d0402666afa6cf1724d8b665376654446f7a9bc367bf337a1b5dab254cde926f58977075745175904db359ba4d962266d2d714e34e7d5fb877e11268b6a63eb8d1bc200ccdd844785694c050311f53d7e367c3a988b9ea") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x0, @loopback}, @in={0x2, 0x4e22, @local}], 0x2c) 17:49:04 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) recvfrom$inet6(r0, &(0x7f0000000640)=""/4096, 0x1000, 0x2000, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @loopback, 0x5}, 0x1c) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x202000) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:04 executing program 2 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:04 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x8000a0ffffffff}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:04 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 339.798479] FAULT_INJECTION: forcing a failure. [ 339.798479] name failslab, interval 1, probability 0, space 0, times 0 [ 339.846473] CPU: 1 PID: 13543 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 339.855015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.855037] Call Trace: [ 339.855060] dump_stack+0x244/0x39d [ 339.855107] ? dump_stack_print_info.cold.1+0x20/0x20 [ 339.855140] should_fail.cold.4+0xa/0x17 [ 339.855181] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.855199] ? pick_next_task_fair+0xa35/0x1c90 [ 339.855226] ? rcu_read_lock_sched_held+0x14f/0x180 [ 339.855272] ? zap_class+0x640/0x640 [ 339.889987] ? print_usage_bug+0xc0/0xc0 [ 339.890004] ? __account_cfs_rq_runtime+0x790/0x790 [ 339.890026] ? find_held_lock+0x36/0x1c0 [ 339.890048] ? __lock_is_held+0xb5/0x140 [ 339.890124] ? md_do_sync.cold.75+0x59e/0x24d3 [ 339.890156] ? perf_trace_sched_process_exec+0x860/0x860 [ 339.916059] __should_failslab+0x124/0x180 [ 339.916088] should_failslab+0x9/0x14 [ 339.916106] kmem_cache_alloc+0x2be/0x730 [ 339.916130] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 339.916150] __kernfs_new_node+0x127/0x8d0 [ 339.926182] ? trace_hardirqs_off_caller+0x300/0x300 [ 339.926200] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 339.926226] ? _raw_spin_unlock_irq+0x60/0x80 [ 339.926245] ? __schedule+0x168b/0x21d0 [ 339.934265] ? zap_class+0x640/0x640 [ 339.934285] ? zap_class+0x640/0x640 [ 339.934302] ? trace_hardirqs_on+0xbd/0x310 [ 339.934319] ? kasan_check_read+0x11/0x20 [ 339.934345] ? find_held_lock+0x36/0x1c0 [ 339.934372] kernfs_new_node+0x95/0x120 [ 339.943523] kernfs_create_dir_ns+0x4d/0x160 [ 339.943547] internal_create_group+0x5fc/0xd80 [ 339.943587] ? remove_files.isra.1+0x190/0x190 [ 339.943600] ? up_write+0x7b/0x220 [ 339.943618] ? down_write_nested+0x130/0x130 [ 339.952939] ? down_read+0x120/0x120 [ 339.952974] sysfs_create_group+0x1f/0x30 [ 339.952993] lo_ioctl+0x1307/0x1d60 [ 339.953021] ? lo_rw_aio+0x1ef0/0x1ef0 [ 339.953043] blkdev_ioctl+0x9ac/0x2010 [ 339.969947] ? blkpg_ioctl+0xc10/0xc10 [ 339.969963] ? lock_downgrade+0x900/0x900 [ 339.969979] ? check_preemption_disabled+0x48/0x280 [ 339.970003] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 339.970019] ? kasan_check_read+0x11/0x20 [ 339.970040] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 339.978057] ? rcu_softirq_qs+0x20/0x20 [ 339.978095] ? __fget+0x4d1/0x740 [ 339.978120] ? ksys_dup3+0x680/0x680 [ 339.978151] block_ioctl+0xee/0x130 [ 339.978168] ? blkdev_fallocate+0x400/0x400 [ 339.978190] do_vfs_ioctl+0x1de/0x1720 [ 339.986403] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 339.986424] ? ioctl_preallocate+0x300/0x300 [ 339.986449] ? __fget_light+0x2e9/0x430 17:49:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xad000000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 339.994812] ? fget_raw+0x20/0x20 [ 339.994832] ? rcu_read_lock_sched_held+0x14f/0x180 [ 339.994848] ? kmem_cache_free+0x24f/0x290 [ 339.994870] ? putname+0xf7/0x130 [ 339.994890] ? do_syscall_64+0x9a/0x820 [ 339.994909] ? do_syscall_64+0x9a/0x820 [ 340.004084] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 340.004107] ? security_file_ioctl+0x94/0xc0 [ 340.004127] ksys_ioctl+0xa9/0xd0 [ 340.004151] __x64_sys_ioctl+0x73/0xb0 [ 340.031347] do_syscall_64+0x1b9/0x820 [ 340.031364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 340.031383] ? syscall_return_slowpath+0x5e0/0x5e0 [ 340.031399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.031420] ? trace_hardirqs_on_caller+0x310/0x310 [ 340.049367] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 340.049387] ? prepare_exit_to_usermode+0x291/0x3b0 [ 340.049410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.066252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.066265] RIP: 0033:0x4573d7 17:49:05 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:05 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x7, {0x0, 0x1}}, 0x20) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) splice(r1, &(0x7f0000000040), r0, &(0x7f0000000080), 0x200, 0x8) [ 340.066282] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.066291] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.066307] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 340.066323] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 340.087365] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 340.087375] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 340.087384] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432a0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:05 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:05 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:05 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x5, &(0x7f0000000100)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x1000000, 0x1103, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000300)={@local, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)) r3 = gettid() getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x2}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @multicast2}}, [0x3, 0x1, 0xffffffffffffbc4c, 0x6, 0x3, 0x7, 0x0, 0x0, 0x3, 0xffff, 0x0, 0x0, 0x8000, 0x0, 0xc9a5]}, &(0x7f0000000440)=0x100) r4 = getpgid(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r6 = dup2(r5, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[]}}, 0x44801) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ptrace$setregs(0xf, r4, 0xfffffffffffff75b, &(0x7f00000007c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x0, @loopback}, @in={0x2, 0x4e22, @local}], 0x2c) 17:49:05 executing program 2 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0xffffffffa0008000}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:05 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fe5ba8fa763c1e49d057"], 0x1) 17:49:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "", 0x3}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 340.580273] FAULT_INJECTION: forcing a failure. [ 340.580273] name failslab, interval 1, probability 0, space 0, times 0 [ 340.611164] CPU: 0 PID: 13600 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 340.619720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.629089] Call Trace: [ 340.629118] dump_stack+0x244/0x39d [ 340.629144] ? dump_stack_print_info.cold.1+0x20/0x20 [ 340.629162] ? radix_tree_tag_set+0x3d0/0x3d0 [ 340.629196] should_fail.cold.4+0xa/0x17 [ 340.649164] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 340.654306] ? kernfs_activate+0x8e/0x2c0 [ 340.658521] ? zap_class+0x640/0x640 [ 340.662288] ? lock_release+0xa10/0xa10 [ 340.666277] ? perf_trace_sched_process_exec+0x860/0x860 [ 340.671754] ? find_held_lock+0x36/0x1c0 [ 340.675838] ? __lock_is_held+0xb5/0x140 [ 340.679926] ? perf_trace_sched_process_exec+0x860/0x860 [ 340.679946] ? find_held_lock+0x36/0x1c0 [ 340.689481] __should_failslab+0x124/0x180 [ 340.693731] should_failslab+0x9/0x14 [ 340.697541] kmem_cache_alloc+0x2be/0x730 [ 340.697573] ? find_held_lock+0x36/0x1c0 [ 340.697596] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 340.697616] __kernfs_new_node+0x127/0x8d0 [ 340.697644] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 340.697661] ? kasan_check_write+0x14/0x20 [ 340.697680] ? __mutex_unlock_slowpath+0x197/0x8c0 17:49:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:05 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:05 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 340.697695] ? __kernfs_new_node+0x697/0x8d0 [ 340.697715] ? wait_for_completion+0x8a0/0x8a0 [ 340.697733] ? zap_class+0x640/0x640 [ 340.697753] ? kasan_check_write+0x14/0x20 [ 340.697780] ? __lock_is_held+0xb5/0x140 [ 340.697796] ? wait_for_completion+0x8a0/0x8a0 [ 340.697825] ? mutex_unlock+0xd/0x10 [ 340.697840] ? kernfs_activate+0x21a/0x2c0 [ 340.697862] kernfs_new_node+0x95/0x120 [ 340.697884] __kernfs_create_file+0x5a/0x340 [ 340.697907] sysfs_add_file_mode_ns+0x222/0x530 [ 340.697934] internal_create_group+0x3df/0xd80 [ 340.697960] ? remove_files.isra.1+0x190/0x190 [ 340.697972] ? up_write+0x7b/0x220 [ 340.697988] ? down_write_nested+0x130/0x130 [ 340.698003] ? down_read+0x120/0x120 [ 340.698035] sysfs_create_group+0x1f/0x30 [ 340.698055] lo_ioctl+0x1307/0x1d60 [ 340.698082] ? lo_rw_aio+0x1ef0/0x1ef0 [ 340.711315] blkdev_ioctl+0x9ac/0x2010 [ 340.711338] ? blkpg_ioctl+0xc10/0xc10 [ 340.711355] ? lock_downgrade+0x900/0x900 [ 340.711370] ? check_preemption_disabled+0x48/0x280 17:49:05 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) [ 340.711395] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 340.711416] ? kasan_check_read+0x11/0x20 [ 340.720410] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 340.720430] ? rcu_softirq_qs+0x20/0x20 [ 340.720460] ? __fget+0x4d1/0x740 [ 340.720487] ? ksys_dup3+0x680/0x680 [ 340.742356] block_ioctl+0xee/0x130 [ 340.742375] ? blkdev_fallocate+0x400/0x400 [ 340.742394] do_vfs_ioctl+0x1de/0x1720 [ 340.742415] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 340.742435] ? ioctl_preallocate+0x300/0x300 [ 340.742453] ? __fget_light+0x2e9/0x430 [ 340.742470] ? fget_raw+0x20/0x20 [ 340.755383] ? rcu_read_lock_sched_held+0x14f/0x180 [ 340.755404] ? kmem_cache_free+0x24f/0x290 [ 340.755426] ? putname+0xf7/0x130 [ 340.755458] ? do_syscall_64+0x9a/0x820 [ 340.755482] ? do_syscall_64+0x9a/0x820 [ 340.781215] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 340.781239] ? security_file_ioctl+0x94/0xc0 [ 340.781261] ksys_ioctl+0xa9/0xd0 [ 340.781285] __x64_sys_ioctl+0x73/0xb0 [ 340.793820] do_syscall_64+0x1b9/0x820 [ 340.793838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 17:49:06 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 340.793863] ? syscall_return_slowpath+0x5e0/0x5e0 [ 340.801726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.801748] ? trace_hardirqs_on_caller+0x310/0x310 [ 340.801767] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 340.801785] ? prepare_exit_to_usermode+0x291/0x3b0 [ 340.801807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.809322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.809335] RIP: 0033:0x4573d7 [ 340.809352] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.809361] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.809376] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 340.809386] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 340.809395] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 340.809404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 340.809414] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:06 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x2000, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000000c0)=""/188) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x1, 0x4) 17:49:06 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:06 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x5, &(0x7f0000000100)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x1000000, 0x1103, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000300)={@local, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)) r3 = gettid() getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x2}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @multicast2}}, [0x3, 0x1, 0xffffffffffffbc4c, 0x6, 0x3, 0x7, 0x0, 0x0, 0x3, 0xffff, 0x0, 0x0, 0x8000, 0x0, 0xc9a5]}, &(0x7f0000000440)=0x100) r4 = getpgid(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r6 = dup2(r5, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[]}}, 0x44801) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ptrace$setregs(0xf, r4, 0xfffffffffffff75b, &(0x7f00000007c0)="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") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x0, @loopback}, @in={0x2, 0x4e22, @local}], 0x2c) 17:49:06 executing program 2 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:06 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8200, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) r1 = open(&(0x7f0000021000)='./file0\x00', 0xfffffffffffffffc, 0x0) fchdir(r1) r2 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x7, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:06 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x1000000, 0xae, 0xfffffffffffffffd}, 0x20) [ 341.351238] FAULT_INJECTION: forcing a failure. [ 341.351238] name failslab, interval 1, probability 0, space 0, times 0 17:49:06 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001c40)={'filter\x00', 0x4}, 0x68) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') recvmmsg(r1, &(0x7f0000001b80)=[{{&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000140)=""/188, 0xbc}, {&(0x7f0000000200)=""/93, 0x5d}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000380)=""/93, 0x5d}, {&(0x7f0000000400)=""/78, 0x4e}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/212, 0xd4}, {&(0x7f0000000580)=""/7, 0x7}, {&(0x7f0000001640)=""/206, 0xce}], 0x9, &(0x7f0000001800)=""/220, 0xdc, 0x1838}, 0x8}, {{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001900)=""/80, 0x50}, {&(0x7f0000001980)=""/146, 0x92}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000001a40)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x734c}, 0x22}], 0x2, 0x0, &(0x7f0000001c00)={0x0, 0x1c9c380}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d00)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001e00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001fc0)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000020c0)=0xe8) getpeername$packet(r1, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002140)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000007cc0)={@rand_addr, @multicast1, 0x0}, &(0x7f0000007d00)=0xc) accept$packet(r1, &(0x7f0000007d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007d80)=0x14) accept$packet(r1, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007e00)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000007f80)={@dev, @multicast2, 0x0}, &(0x7f0000007fc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008040)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000008140)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000008240)={0x0, @broadcast, @remote}, &(0x7f0000008280)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000082c0)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000083c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000009800)={'bond_slave_0\x00', 0x0}) recvmsg(r0, &(0x7f000000ae40)={&(0x7f000000ac80)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f000000ad40)=[{&(0x7f000000ad00)}], 0x1, &(0x7f000000ad80)=""/131, 0x83, 0x9c7}, 0x0) getpeername$packet(r0, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000aec0)=0x14) recvmsg(r1, &(0x7f000000b640)={&(0x7f000000b180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000b4c0)=[{&(0x7f000000b200)=""/12, 0xc}, {&(0x7f000000b240)=""/187, 0xbb}, {&(0x7f000000b300)=""/89, 0x59}, {&(0x7f000000b380)=""/38, 0x26}, {&(0x7f000000b3c0)=""/208, 0xd0}], 0x5, &(0x7f000000b540)=""/212, 0xd4, 0xb957}, 0x40002060) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000bbc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000bb80)={&(0x7f0000002180)=ANY=[@ANYBLOB="d8040000", @ANYRES16=r2, @ANYBLOB="000026bd7000fbdbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="300102003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400080000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3401020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400a60f000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400080000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004004b843f000100000008000100", @ANYRES32=r14, @ANYBLOB="4400020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040002000000080007000000000008000100", @ANYRES32=r15, @ANYBLOB="8000020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000008000100", @ANYRES32=r16, @ANYBLOB="7c0002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e636500"], 0x4d8}, 0x1, 0x0, 0x0, 0x8800}, 0x1) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0xfffffffffffffde7) 17:49:06 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 341.417925] CPU: 0 PID: 13647 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 341.426481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.436320] Call Trace: [ 341.438935] dump_stack+0x244/0x39d [ 341.442606] ? dump_stack_print_info.cold.1+0x20/0x20 [ 341.447837] should_fail.cold.4+0xa/0x17 [ 341.451921] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 341.457046] ? lock_release+0xa10/0xa10 [ 341.461042] ? perf_trace_sched_process_exec+0x860/0x860 [ 341.466523] ? zap_class+0x640/0x640 [ 341.470277] ? find_held_lock+0x36/0x1c0 [ 341.474359] ? __lock_is_held+0xb5/0x140 [ 341.478521] ? ept_sync_page+0x128/0x880 [ 341.482627] ? perf_trace_sched_process_exec+0x860/0x860 [ 341.488089] ? kernfs_activate+0x21a/0x2c0 [ 341.492348] __should_failslab+0x124/0x180 [ 341.496612] should_failslab+0x9/0x14 [ 341.500423] kmem_cache_alloc+0x2be/0x730 [ 341.504609] ? lock_downgrade+0x900/0x900 [ 341.508776] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 341.513815] __kernfs_new_node+0x127/0x8d0 17:49:06 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl(r0, 0x4, &(0x7f0000000000)="29aff3fd75cfcbf5399e09ef98bbfebdba1ca732f0c2bdd62d2b6f7335d5f8b219dc2a5e8d07e959e03173d8409259d4721622b874dfd8f2a87d7fa3c09e8de0ed55997cf34db8643e6db4dd5a28510d2ed6eed342426b1d0015d02246b0c75fd1fddd0db34d4ccd757e0b5843f2b79723c666f9bdd74f4dcd86e4c9d6c56147dbed1bb1ac35584a229b597707ba9db4e6d0cf8064ef5999a21d1e69") r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0x0) 17:49:06 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 341.518067] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 341.518086] ? zap_class+0x640/0x640 [ 341.518111] ? __lock_is_held+0xb5/0x140 [ 341.518127] ? wait_for_completion+0x8a0/0x8a0 [ 341.518157] ? mutex_unlock+0xd/0x10 [ 341.518172] ? kernfs_activate+0x21a/0x2c0 [ 341.518191] ? kernfs_walk_and_get_ns+0x340/0x340 [ 341.518209] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 341.518223] ? kernfs_link_sibling+0x1d2/0x3b0 [ 341.518247] kernfs_new_node+0x95/0x120 [ 341.518269] __kernfs_create_file+0x5a/0x340 [ 341.526752] sysfs_add_file_mode_ns+0x222/0x530 [ 341.548155] internal_create_group+0x3df/0xd80 [ 341.548185] ? remove_files.isra.1+0x190/0x190 [ 341.548200] ? up_write+0x7b/0x220 [ 341.548216] ? down_write_nested+0x130/0x130 [ 341.548233] ? down_read+0x120/0x120 [ 341.548266] sysfs_create_group+0x1f/0x30 [ 341.548287] lo_ioctl+0x1307/0x1d60 [ 341.562391] ? lo_rw_aio+0x1ef0/0x1ef0 [ 341.562414] blkdev_ioctl+0x9ac/0x2010 [ 341.562434] ? blkpg_ioctl+0xc10/0xc10 [ 341.562455] ? lock_downgrade+0x900/0x900 [ 341.584747] ? check_preemption_disabled+0x48/0x280 [ 341.597001] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 341.597020] ? kasan_check_read+0x11/0x20 [ 341.597039] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 341.597058] ? rcu_softirq_qs+0x20/0x20 [ 341.597089] ? __fget+0x4d1/0x740 [ 341.597111] ? ksys_dup3+0x680/0x680 [ 341.608540] block_ioctl+0xee/0x130 [ 341.608576] ? blkdev_fallocate+0x400/0x400 [ 341.608595] do_vfs_ioctl+0x1de/0x1720 [ 341.608617] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 17:49:06 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0x1) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0xb4, 0x800, {"e5dc184d04faca9fc6769bec8bccfb3e1c98b9d3fd42e772bd18a18cd22f2a2a50a0e0560f6c1d45c8c2349ba335e5100ee4aa966daf53d8c2a186ba1fb97b834a7cfa28c051f6fff8392a1a95450f70c81a1d24cd10d8d6eb972900b78a3f1523aa64ad7aabb2f3b0b1e9ea3319ba93e46e06d6b17b59249a2863363b228f0ffed8e82729bd9eec757969e7a44e3430641c34791ff1a1728acc6a77"}}, {0x0, "ced8911177bdaed795789796f9af40c91bef2abe9cf30d715fcf1f14b6c101ecb41bcfd07831a929561d14c03e690e23a5c720f5b33481cda03aa2e3e9ea2ee45568a1a5bf5d50863ab7b605c7b3aa34201f0c633fe8b8023de2e5f07e27751a55f8d7b711cb67f085d6b0a7a5d79020db30"}}, &(0x7f0000000140)=""/173, 0x128, 0xad, 0x1}, 0x20) vmsplice(r1, &(0x7f0000001640)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000280)="182719ca7132f55c8be0bd98f68fbe63fd8d9bb4e38b608aa856b7bd8ae448d312b54a04eff183d3b519296578a4b43fc3ef5d880a824b862152babd", 0x3c}, {&(0x7f00000002c0)="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", 0xfb}, {&(0x7f00000003c0)="7a768848b45d58609dddca255231029d2f7ab7543a905ff4cc8cdc29cd0600c01c44", 0x22}, {&(0x7f0000000400)="12f5392d36d08abd613cc8af8a3fea6ac2125f5dfa29caa6309cc72e42bebc5fef87a3fb570ec916a360454a47bb205be7399713f693c4ff664c55e4b2d1f237de74e6e99118dba452a15d3d4361558cb6543ee36c951eac1de009cf66f3d520c04de24cbd59ef525162cb3ca5900737c26c27606e3dfe578affc0a62a6511104f3fb65ce838a2e13861a03888", 0x8d}, {&(0x7f00000004c0)="a91758c6f5c6f99fa0f11cd141a6f473aaf4243bf8e57d08d25d8c09843fa46d107dd09823553ee75f1e15c0d17d8d4d6c58628372a425d03660df837065b85a1191a6c46937e9cef1f88df026ee40dcaf42dcc532fe3d253f998399b5d60662739bb5eb6209bc8edd0fb9556c93de6d040292ea2918bce666fd907f804175f041f6819ab7de27417bec2010829df4346fb103e330af42f40ba8407b6e06ad19e8f90aee81796084d4e2b34052c3a8bc4697dd26aa01dd403ab981c7f7001f84b5c8", 0xc2}], 0x6, 0x0) [ 341.608638] ? ioctl_preallocate+0x300/0x300 [ 341.608656] ? __fget_light+0x2e9/0x430 [ 341.608672] ? fget_raw+0x20/0x20 [ 341.608693] ? rcu_read_lock_sched_held+0x14f/0x180 [ 341.616746] ? kmem_cache_free+0x24f/0x290 [ 341.616765] ? putname+0xf7/0x130 [ 341.616785] ? do_syscall_64+0x9a/0x820 [ 341.616814] ? do_syscall_64+0x9a/0x820 [ 341.640162] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 341.640184] ? security_file_ioctl+0x94/0xc0 [ 341.640204] ksys_ioctl+0xa9/0xd0 [ 341.640225] __x64_sys_ioctl+0x73/0xb0 [ 341.640246] do_syscall_64+0x1b9/0x820 [ 341.640262] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 341.640281] ? syscall_return_slowpath+0x5e0/0x5e0 [ 341.640297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.640316] ? trace_hardirqs_on_caller+0x310/0x310 [ 341.640335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 341.640354] ? prepare_exit_to_usermode+0x291/0x3b0 [ 341.640376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.640399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.640411] RIP: 0033:0x4573d7 [ 341.640429] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.640437] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.640452] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 341.640462] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 341.640471] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 341.640486] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 341.651270] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 341.699262] kauditd_printk_skb: 18 callbacks suppressed [ 341.699278] audit: type=1804 audit(1539712146.735:383): pid=13679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/246/file0" dev="sda1" ino=16663 res=1 [ 341.777767] audit: type=1804 audit(1539712146.735:384): pid=13679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/246/file0" dev="sda1" ino=16663 res=1 [ 341.798169] EXT4-fs: 9 callbacks suppressed [ 341.798181] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 341.896581] audit: type=1804 audit(1539712146.935:385): pid=13685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/247/file0" dev="sda1" ino=16577 res=1 [ 341.996601] audit: type=1804 audit(1539712146.935:386): pid=13688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/247/file0" dev="sda1" ino=16577 res=1 17:49:07 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)) r0 = getuid() syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x80000000, 0x9, &(0x7f0000000680)=[{&(0x7f00000000c0)="d0bf6c9ae96e281c2d0c967ac645a98c583cf778c45beb956edb87a4e7fe1a60e3e49b7e481636e8ee566ceb1c6c20509262fb209220b1aaaac7b91a99c6bcd4d2bf036f08b25e58da18979f88c0b354eb98f429240373cc69c60839980dee26ff6c604ca57fd5229b850fc9f530ef7ebcc071733163ad031405a6a012411b2b59859a68984a11c21bd9eacd9e5ecbb545681118db9b37fcf88e8907ea80cb5b4fed9ec15faae447f321becbbfa6c81733fb8083f8564920c03705", 0xbb, 0x100000001}, {&(0x7f0000000180)="b5c3ef59a21756a3206d91916907df1e6b941f7a12003f189fd8648056b58819fa94efe2c3c88b49bc72324bca1c6ffed5c320262507dbb9bd92529cd509df0dcac0", 0x42, 0x9}, {&(0x7f0000000200)="0dca18fbbe9202fd2e8767721263d95e66bace5be8383a4005cb50871f894f61bf77c8f237e878243632a39b16124f15f4f459db527e8e4c5a01a322bda3838ddf7448b73e7a0582c8292472d2f12e75b0244e0d19f3db03a9a8f2bd19cbe0248b0b3f83193f028b58bc640b412fd3d43d57f709aca9", 0x76, 0x4}, {&(0x7f0000000280)="da3623759c9bad5d37356be996c84cd8c11132e97443d54feb6c67007659dedfbbb5e6051d6532e35795c2298710a5592454dd0fb23f71f958fdb1d87d0b8b921db0385bc85e179f20391d7142fafe09b2082c5e72e94498779433c24eab3ed7e056cf5020b05cf1ed6371ebf769a895c7af1f4a33bb469033be5070ca2f9b7742e80fe889279c6f6a2dc00d654a40031f28cf11e6e5fcd2cd0dec331d53981589d6304a2f4beb7ac7ca6cb1fdea86add4fc987a8b3a98e2307967a9f260cd468569d40716a058eed559", 0xca, 0xffffffff}, {&(0x7f0000000380)="a19a450724d86374abe45731084cb7741f3d7d8b0591b836ee3f17cd45beb3df3fecee231e978818c240abba772c4b3ff58ee95a04cc3b338b31e04ed9e474fddf496f5ab0cc40e8c94270e0e4774ad2e63e60dbca780f6fdacddf20e61954c3d42b1cd19230fd15984c2395b5231985cc8d6e00e36c8a615fdb921131322ff1548622e3b208b8842f335ed4e8d65067f714b75156b152306abe473ac7dfcbd69bab6f9efbb24c0d5533ea8b66618755e76267b7c6132b149a918a66a05413df49966d5919b21ff0b067076296a73f9661a24feddbf139a10cad2f53d82e29af95ca86007394c15f5c94c1b211f7906ecac6565707e1063d", 0xf8, 0x3f}, {&(0x7f0000000480)="a4eba938fb9f1aca0d1c3135137c4bc3ba96039927d592fc12576a94e2aa1d2eee9865c340d2bd", 0x27, 0x9}, {&(0x7f00000004c0)="735607df260b96bbbe4b65dbc2cdc74240344e693cd8931895342e539df15c", 0x1f, 0x2}, {&(0x7f0000000500)="b64f0812eeb442d112edfaf6344b79cea57bb818cd8bf9ecc73ddfce13ae351195bc55d2fc5864c589f857ddc4971ba9f5461197e5fa5ceb6855a58df0347f1ae873a21bf7803695fa0839dc3aea063cc21853a6c49d27f57cc6d0f400dd53f59075769566d944afbb3e970827d3610fc4c40492a51c1c83508d6ea7a7ae0d7953cf9133ab6610149ed39d084ae6e8647024fbf0b7eb07342efe79cf462777eed605ad56c63c577ac116dba2860de68ac6317707b66b8fab900f2b854e405b1365bcad7f144d1f505ee28e32a9b669d1a71308af4f", 0xd5, 0x2}, {&(0x7f0000000600)="79d9132d8ead83bbecc5730b532c9aff91a0c15684fe65b1ac332247369c4957d4a65712326572d863419ea4305513efb62f2585382bfaed691fbd8e88870c3873c0510b86dc6af72f9bd0b89f", 0x4d, 0x2d9f}], 0x4444, &(0x7f0000000a40)=ANY=[@ANYBLOB='nouser_xattr,fault_injection=0x0000000000000004,fault_injection=0x0000000000000003,fault_injection=0x0000000000008001,user_xattr,user_xattr,acl,nouser_xattr,user_xattr,fowner<', @ANYRESDEC=r0, @ANYBLOB="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"]) r1 = socket$packet(0x11, 0x3, 0x300) unshare(0x4000100) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000980)={0xe60, 0xffffffffffffffff, 0x200, 0x1, 0x421, 0x7f, 0x9, 0x3, 0x0}, &(0x7f00000009c0)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000a00)={r3, 0x8}, 0xc) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r1, 0x0) 17:49:07 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:07 executing program 4: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:07 executing program 2 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x18, 0xae, 0xfffffffffffffffd}, 0x20) [ 342.194010] audit: type=1804 audit(1539712147.265:387): pid=13708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/248/file0" dev="sda1" ino=16547 res=1 [ 342.195388] FAULT_INJECTION: forcing a failure. [ 342.195388] name failslab, interval 1, probability 0, space 0, times 0 [ 342.256347] erofs: read_super, device -> /dev/loop1 [ 342.272750] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 342.286993] audit: type=1804 audit(1539712147.265:388): pid=13708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/248/file0" dev="sda1" ino=16547 res=1 [ 342.300063] erofs: options -> nouser_xattr,fault_injection=0x0000000000000004,fault_injection=0x0000000000000003,fault_injection=0x0000000000008001,user_xattr,user_xattr,acl,nouser_xattr,user_xattr,fowner<00000000000000000000,dont_hash,smackfsdef=vboxnet [ 342.333419] CPU: 1 PID: 13702 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 342.341935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.351298] Call Trace: [ 342.353911] dump_stack+0x244/0x39d [ 342.357577] ? dump_stack_print_info.cold.1+0x20/0x20 [ 342.362831] should_fail.cold.4+0xa/0x17 [ 342.366919] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.372048] ? lock_release+0xa10/0xa10 [ 342.376038] ? perf_trace_sched_process_exec+0x860/0x860 [ 342.381538] ? zap_class+0x640/0x640 [ 342.385287] ? find_held_lock+0x36/0x1c0 [ 342.389368] ? __lock_is_held+0xb5/0x140 [ 342.393465] ? perf_trace_sched_process_exec+0x860/0x860 [ 342.398934] ? kernfs_activate+0x21a/0x2c0 [ 342.403198] __should_failslab+0x124/0x180 [ 342.407455] should_failslab+0x9/0x14 [ 342.411272] kmem_cache_alloc+0x2be/0x730 [ 342.415439] ? lock_downgrade+0x900/0x900 [ 342.419611] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 342.424654] __kernfs_new_node+0x127/0x8d0 [ 342.428907] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 342.433809] ? zap_class+0x640/0x640 [ 342.437547] ? __lock_is_held+0xb5/0x140 [ 342.441639] ? wait_for_completion+0x8a0/0x8a0 [ 342.446252] ? mutex_unlock+0xd/0x10 [ 342.449981] ? kernfs_activate+0x21a/0x2c0 [ 342.454233] ? kernfs_walk_and_get_ns+0x340/0x340 [ 342.459101] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 342.464659] ? kernfs_link_sibling+0x1d2/0x3b0 [ 342.469272] kernfs_new_node+0x95/0x120 [ 342.473270] __kernfs_create_file+0x5a/0x340 [ 342.477709] sysfs_add_file_mode_ns+0x222/0x530 [ 342.482409] internal_create_group+0x3df/0xd80 [ 342.487022] ? remove_files.isra.1+0x190/0x190 [ 342.491628] ? up_write+0x7b/0x220 [ 342.495182] ? down_write_nested+0x130/0x130 [ 342.499608] ? down_read+0x120/0x120 [ 342.503353] sysfs_create_group+0x1f/0x30 [ 342.507518] lo_ioctl+0x1307/0x1d60 [ 342.511184] ? lo_rw_aio+0x1ef0/0x1ef0 [ 342.515098] blkdev_ioctl+0x9ac/0x2010 [ 342.519009] ? blkpg_ioctl+0xc10/0xc10 [ 342.522912] ? lock_downgrade+0x900/0x900 [ 342.527087] ? check_preemption_disabled+0x48/0x280 [ 342.532134] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 342.537089] ? kasan_check_read+0x11/0x20 [ 342.541273] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 342.546582] ? rcu_softirq_qs+0x20/0x20 [ 342.550598] ? __fget+0x4d1/0x740 [ 342.554004] erofs: cannot find valid erofs superblock [ 342.554087] ? ksys_dup3+0x680/0x680 [ 342.563104] block_ioctl+0xee/0x130 [ 342.567244] ? blkdev_fallocate+0x400/0x400 [ 342.571599] do_vfs_ioctl+0x1de/0x1720 [ 342.575509] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 342.575532] ? ioctl_preallocate+0x300/0x300 [ 342.575551] ? __fget_light+0x2e9/0x430 [ 342.575578] ? fget_raw+0x20/0x20 [ 342.575597] ? rcu_read_lock_sched_held+0x14f/0x180 [ 342.585551] ? kmem_cache_free+0x24f/0x290 [ 342.585580] ? putname+0xf7/0x130 17:49:07 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:07 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:07 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 342.585601] ? do_syscall_64+0x9a/0x820 [ 342.585617] ? do_syscall_64+0x9a/0x820 [ 342.585637] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 342.593074] ? security_file_ioctl+0x94/0xc0 [ 342.593097] ksys_ioctl+0xa9/0xd0 [ 342.593118] __x64_sys_ioctl+0x73/0xb0 [ 342.593139] do_syscall_64+0x1b9/0x820 [ 342.602388] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 342.602412] ? syscall_return_slowpath+0x5e0/0x5e0 [ 342.602428] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.602447] ? trace_hardirqs_on_caller+0x310/0x310 [ 342.602467] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 342.609920] ? prepare_exit_to_usermode+0x291/0x3b0 [ 342.609945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.609971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.609983] RIP: 0033:0x4573d7 [ 342.610000] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.610008] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.610022] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 342.610036] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 342.618591] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 342.618601] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 342.618610] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 342.655195] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 342.781634] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x10, 0x7, 0x2, {{0x3, '!&-'}, 0x8}}, 0x10) quotactl(0x80000101, 0x0, 0x0, &(0x7f00000003c0)) 17:49:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:07 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:07 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="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"], @ANYRES16=0x0]], 0x10) 17:49:07 executing program 2 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:07 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 342.893099] audit: type=1804 audit(1539712147.965:389): pid=13747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/249/file0" dev="sda1" ino=16578 res=1 [ 342.951460] audit: type=1804 audit(1539712147.975:390): pid=13750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/249/file0" dev="sda1" ino=16578 res=1 17:49:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x8000, 0x4, &(0x7f0000000180)=[{&(0x7f0000000080)="c44843d33309ce30ee41129edec992eb715fd2a9f0b7c03049fe58284ba1d8a3fa66079ba9d8c7eca71682856e46ca403b5805d7d3a490c560d8330ac30485fb904203b0129008243dd8354c14d110524f4edec5038b028566b8332d3861c5c7852964d4b151f7db38f6cba79e", 0x6d}, {&(0x7f0000000100)="3726a207d981beb034cbcffcc83fe65285adfc4059b28672a408bef46385a54a705bbb7e2cc24eba93b1b0f1d0f290aadbc42967894727d636b7a1093da4ef576a6a3e3ee3c1e3992d262e41d814e93f651ea60973e124675f7ef85ae0f171e70601b854e4ac6a04af7bc9248070e048cb4495fd", 0x74, 0x8}, {&(0x7f0000000240)="27e3424f43289ee2bb638088cf0351ec7e33c3bba3e5c2ba48027661bf7c6bdc2e166e73d75791c644fa359c7a9dff24f8b236decfb095295315ba1abdf08f499e5d9b1b818527a9d6e1930061fd39071a4673794c8baf05513b835b5a1006b98b838f910840e965f043f5797f14b008610daec8e1bd1c3436458bcef2420f73b148335f4f11f53183366ea0538518484506e791b239d8c903e9af842fbc816c1b7b8f394003802f06ebe3346e5f8851c03f4f22ddeacb04b67ad8398c05", 0xbe, 0x9}, {&(0x7f0000000300)="8556df313bab7e566026a74fb06afd06f8953dd0399024206c8d87278cc9fe96037bd92eea870e0c1d64a95b87203b6652093c7fd75a4f84a1753e76277cbbb3dac74a9f89ce4e2f3b8c98135afa1b74fb3682b66c1b849aa104509769ec87be98592371db01829bd05060f01b28f6a531a2cde73b1e0630168d6efcf5d9697693af0a54d045d62c1da8dd3cfc2246ced8c0bb88defb9674329f9629cb339046caffefc9337a1f3dae30747dd4c762c5120f19533256945849a79b79c1e058b8987d4c7d349eb419941bb26e1850cf0927d9e2d89ab9f30f994f58", 0xdb, 0x1}], 0x10000, &(0x7f0000000400)={[{@noacl='noacl'}, {@acl='acl'}, {@fault_injection={'fault_injection'}}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x8000}}, {@nouser_xattr='nouser_xattr'}], [{@measure='measure'}]}) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 342.998815] FAULT_INJECTION: forcing a failure. [ 342.998815] name failslab, interval 1, probability 0, space 0, times 0 [ 343.035204] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 343.085688] CPU: 1 PID: 13759 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 343.094256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.103635] Call Trace: [ 343.106256] dump_stack+0x244/0x39d [ 343.109918] ? dump_stack_print_info.cold.1+0x20/0x20 [ 343.115157] should_fail.cold.4+0xa/0x17 [ 343.119249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.124377] ? lock_release+0xa10/0xa10 [ 343.128378] ? perf_trace_sched_process_exec+0x860/0x860 [ 343.133855] ? zap_class+0x640/0x640 [ 343.133884] ? find_held_lock+0x36/0x1c0 [ 343.133904] ? __lock_is_held+0xb5/0x140 [ 343.145765] ? __trace_note_message+0xf8/0x4d0 [ 343.150390] ? perf_trace_sched_process_exec+0x860/0x860 [ 343.155858] ? kernfs_activate+0x21a/0x2c0 [ 343.155889] __should_failslab+0x124/0x180 [ 343.155911] should_failslab+0x9/0x14 [ 343.155932] kmem_cache_alloc+0x2be/0x730 [ 343.172353] ? lock_downgrade+0x900/0x900 [ 343.176527] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 343.181588] __kernfs_new_node+0x127/0x8d0 [ 343.184784] erofs: read_super, device -> /dev/loop4 [ 343.185846] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 343.185866] ? zap_class+0x640/0x640 [ 343.185895] ? __lock_is_held+0xb5/0x140 [ 343.203449] ? wait_for_completion+0x8a0/0x8a0 [ 343.206443] erofs: options -> noacl,acl,fault_injection=0x0000000000000000,fault_injection=0x0000000000000004,user_xattr,noacl,fault_injection=0x0000000000008000,nouser_xattr,measure, [ 343.208071] ? mutex_unlock+0xd/0x10 [ 343.208089] ? kernfs_activate+0x21a/0x2c0 [ 343.208108] ? kernfs_walk_and_get_ns+0x340/0x340 [ 343.208127] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 343.208142] ? kernfs_link_sibling+0x1d2/0x3b0 [ 343.208168] kernfs_new_node+0x95/0x120 [ 343.242071] erofs: cannot find valid erofs superblock [ 343.242998] __kernfs_create_file+0x5a/0x340 [ 343.243022] sysfs_add_file_mode_ns+0x222/0x530 [ 343.265864] internal_create_group+0x3df/0xd80 [ 343.270474] ? remove_files.isra.1+0x190/0x190 [ 343.270490] ? up_write+0x7b/0x220 [ 343.270508] ? down_write_nested+0x130/0x130 [ 343.283042] ? down_read+0x120/0x120 [ 343.286796] sysfs_create_group+0x1f/0x30 [ 343.286818] lo_ioctl+0x1307/0x1d60 [ 343.286844] ? lo_rw_aio+0x1ef0/0x1ef0 [ 343.298509] blkdev_ioctl+0x9ac/0x2010 [ 343.302435] ? blkpg_ioctl+0xc10/0xc10 [ 343.306336] ? lock_downgrade+0x900/0x900 [ 343.310496] ? check_preemption_disabled+0x48/0x280 [ 343.315541] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 343.320507] ? kasan_check_read+0x11/0x20 [ 343.324677] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 343.329979] ? rcu_softirq_qs+0x20/0x20 [ 343.333981] ? __fget+0x4d1/0x740 [ 343.337460] ? ksys_dup3+0x680/0x680 [ 343.341204] block_ioctl+0xee/0x130 [ 343.344853] ? blkdev_fallocate+0x400/0x400 [ 343.349189] do_vfs_ioctl+0x1de/0x1720 [ 343.353098] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 343.358658] ? ioctl_preallocate+0x300/0x300 [ 343.363093] ? __fget_light+0x2e9/0x430 [ 343.367097] ? fget_raw+0x20/0x20 [ 343.370584] ? rcu_read_lock_sched_held+0x14f/0x180 [ 343.375625] ? kmem_cache_free+0x24f/0x290 [ 343.379877] ? putname+0xf7/0x130 [ 343.383350] ? do_syscall_64+0x9a/0x820 [ 343.387346] ? do_syscall_64+0x9a/0x820 [ 343.391335] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 343.395937] ? security_file_ioctl+0x94/0xc0 [ 343.400368] ksys_ioctl+0xa9/0xd0 [ 343.403854] __x64_sys_ioctl+0x73/0xb0 [ 343.407759] do_syscall_64+0x1b9/0x820 [ 343.411662] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 343.417049] ? syscall_return_slowpath+0x5e0/0x5e0 [ 343.421998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.426870] ? trace_hardirqs_on_caller+0x310/0x310 [ 343.431905] ? prepare_exit_to_usermode+0x3b0/0x3b0 17:49:08 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:08 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 343.436950] ? prepare_exit_to_usermode+0x291/0x3b0 [ 343.441995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.446864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.452073] RIP: 0033:0x4573d7 [ 343.455283] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.474192] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 343.481908] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 343.489192] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 343.496457] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 343.503736] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 343.511118] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 343.528588] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 343.570799] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 343.587229] erofs: read_super, device -> /dev/loop4 [ 343.603077] audit: type=1804 audit(1539712148.675:391): pid=13779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/250/file0" dev="sda1" ino=16611 res=1 [ 343.604770] erofs: options -> noacl,acl,fault_injection=0x0000000000000000,fault_injection=0x0000000000000004,user_xattr,noacl,fault_injection=0x0000000000008000,nouser_xattr,measure, [ 343.643205] audit: type=1804 audit(1539712148.675:392): pid=13779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/250/file0" dev="sda1" ino=16611 res=1 [ 343.645834] erofs: cannot find valid erofs superblock 17:49:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:08 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000040)=ANY=[@ANYBLOB="38000000100001050000000000000000000000006f3172469173118e246d39c761ed09a617941ca9d1e2a61529947253c04134b95585c7a38e8d162f59c696504c4b565c31fea81237e315c26b3665fd7a5b7b3970f2faf6cae577", @ANYRES32=0x0, @ANYBLOB="0000592aa31966b5e7bf3059aced030f0095000000"], 0x3}}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x80000000, 0x12800) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f0000000200)={0x28, 0x0, 0x2, {{0x1000, 0x9, 0x2, r2}}}, 0x28) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getresuid(&(0x7f0000000880), &(0x7f0000000840)=0x0, &(0x7f00000003c0)) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) getresuid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x810000, &(0x7f0000000600)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1ff}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x10001}}], [{@appraise='appraise'}, {@euid_eq={'euid', 0x3d, r5}}, {@euid_eq={'euid', 0x3d, r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'trustedvmnet1vboxnet0keyringsystemposix_acl_access!'}}, {@uid_gt={'uid>', r7}}, {@fowner_gt={'fowner>', r8}}]}}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140)={@dev}, &(0x7f0000000180)=0x14) 17:49:08 executing program 2 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:08 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 343.769195] FAULT_INJECTION: forcing a failure. [ 343.769195] name failslab, interval 1, probability 0, space 0, times 0 [ 343.797535] CPU: 0 PID: 13804 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 343.806134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.815510] Call Trace: [ 343.818141] dump_stack+0x244/0x39d [ 343.821803] ? dump_stack_print_info.cold.1+0x20/0x20 [ 343.827015] should_fail.cold.4+0xa/0x17 [ 343.831076] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.836179] ? lock_release+0xa10/0xa10 [ 343.840150] ? perf_trace_sched_process_exec+0x860/0x860 [ 343.845612] ? zap_class+0x640/0x640 [ 343.849320] ? find_held_lock+0x36/0x1c0 [ 343.853376] ? __lock_is_held+0xb5/0x140 [ 343.857433] ? perf_trace_sched_process_exec+0x860/0x860 [ 343.862874] ? kernfs_activate+0x21a/0x2c0 [ 343.867105] __should_failslab+0x124/0x180 [ 343.871333] should_failslab+0x9/0x14 [ 343.875146] kmem_cache_alloc+0x2be/0x730 [ 343.879293] ? lock_downgrade+0x900/0x900 [ 343.883437] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 343.888450] __kernfs_new_node+0x127/0x8d0 [ 343.892684] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 343.897432] ? zap_class+0x640/0x640 [ 343.901141] ? __lock_is_held+0xb5/0x140 [ 343.905188] ? wait_for_completion+0x8a0/0x8a0 [ 343.909766] ? mutex_unlock+0xd/0x10 [ 343.913470] ? kernfs_activate+0x21a/0x2c0 [ 343.917694] ? kernfs_walk_and_get_ns+0x340/0x340 [ 343.922529] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 343.928077] ? kernfs_link_sibling+0x1d2/0x3b0 [ 343.932664] kernfs_new_node+0x95/0x120 [ 343.936632] __kernfs_create_file+0x5a/0x340 [ 343.941033] sysfs_add_file_mode_ns+0x222/0x530 [ 343.945714] internal_create_group+0x3df/0xd80 [ 343.950292] ? remove_files.isra.1+0x190/0x190 [ 343.954871] ? up_write+0x7b/0x220 [ 343.958409] ? down_write_nested+0x130/0x130 [ 343.962821] ? down_read+0x120/0x120 [ 343.966536] sysfs_create_group+0x1f/0x30 [ 343.970690] lo_ioctl+0x1307/0x1d60 [ 343.974324] ? lo_rw_aio+0x1ef0/0x1ef0 [ 343.978204] blkdev_ioctl+0x9ac/0x2010 [ 343.982085] ? blkpg_ioctl+0xc10/0xc10 [ 343.985964] ? lock_downgrade+0x900/0x900 [ 343.990101] ? check_preemption_disabled+0x48/0x280 [ 343.995115] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 344.000037] ? kasan_check_read+0x11/0x20 [ 344.004189] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 344.009470] ? rcu_softirq_qs+0x20/0x20 [ 344.013442] ? __fget+0x4d1/0x740 [ 344.016887] ? ksys_dup3+0x680/0x680 [ 344.020606] block_ioctl+0xee/0x130 [ 344.024221] ? blkdev_fallocate+0x400/0x400 [ 344.028544] do_vfs_ioctl+0x1de/0x1720 [ 344.032438] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 344.037970] ? ioctl_preallocate+0x300/0x300 [ 344.042368] ? __fget_light+0x2e9/0x430 [ 344.046334] ? fget_raw+0x20/0x20 [ 344.049779] ? rcu_read_lock_sched_held+0x14f/0x180 [ 344.054790] ? kmem_cache_free+0x24f/0x290 [ 344.059015] ? putname+0xf7/0x130 [ 344.062460] ? do_syscall_64+0x9a/0x820 [ 344.066425] ? do_syscall_64+0x9a/0x820 [ 344.070392] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 344.074966] ? security_file_ioctl+0x94/0xc0 [ 344.079369] ksys_ioctl+0xa9/0xd0 [ 344.082814] __x64_sys_ioctl+0x73/0xb0 [ 344.086693] do_syscall_64+0x1b9/0x820 [ 344.090590] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 344.095946] ? syscall_return_slowpath+0x5e0/0x5e0 [ 344.100864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.105698] ? trace_hardirqs_on_caller+0x310/0x310 [ 344.110706] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 344.115717] ? prepare_exit_to_usermode+0x291/0x3b0 [ 344.120743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.125600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.130782] RIP: 0033:0x4573d7 [ 344.133964] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.152859] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 344.160588] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 17:49:08 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:08 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001500)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0}, &(0x7f0000001680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001800)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000001900)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x6, &(0x7f0000001440)=[{&(0x7f00000000c0)="0a261d5a7df57750507a5613d2b7904e7f614ceabdd279281e744e937aec7414c92ca3ac6d254d2a311b9f2878d1d0e4ac146e8e6b6b7b840453b6bcea6317d0b0857aa8afcdc0baadbb165581cb", 0x4e, 0x50}, {&(0x7f0000000140)="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", 0x1000, 0x3}, {&(0x7f0000001140)="31bfdaeaac370b60048cb1bc59387966fe82af371d9da7ad76a5010aa5e3cba6b8f9da48ecaab24446aa702d1512807b3575a6ef8dd80fd3ead329b05daa80eecbba78ab7f8b701df8512737c0a6b63f0c9b0dc674015a6d6492dbad79d326966f1ddf39fa00ee569c1bbd6cc688bd0203d9550b34841e09cb543f41899035022b5af5ee0cc32072af00c972bd95803005ee1deed566a5383f6b8884ff840accd88eb218471738327a259263b049101151b231004a51e72bfd93", 0xba, 0x1}, {&(0x7f0000001200)="ef2de157d9d67f6cee50f16fc015eda3860f6871ffd633a2ac5686a49da602f6a06882a02e969d7678fa27aa8e4a6b1c039dfefca3aa2cbdb0bed144c990bad1dabdf66dfdbc156c92fad041ceed293f63cc376d5f3653c8ee45a0a61823c2ef0647e9e3c4cccf3e227a9443f95e2c209d1074908f196dafeb2c568b2f107555d1243f6ef196e6a6ea671842d82ec3969920540d4896895396a45f8ce13801a288502e6af29ddbec21aaee4913703947e016ad35", 0xb4, 0x100000000}, {&(0x7f00000012c0)="cc4be34638c7d1e19bc3912740f492f2edd44c3ef53f27efe92d8652f41bf861f68d12f064006b59a3fb7390eb9bca145bc8c56b97dbac4dd31325c882f2fb0c4da237567d201d2c58905cc802bc256521a07d9156a7d705481844625ae5117fd0f02ebc36ebd760c6ff1f1e35e21eb3475a2cf9828ef282b5e3ebd0c5413f71f9219168d4997b2eb39b01d1ffb4f6fc6f03ec2edfb011be", 0x98, 0x9}, {&(0x7f0000001380)="e9126455ff22b4c3aec9f92aaabc8f69feacf6fa0bcdd98dd3783f65c5a57a32b137f3a204b5e78b268e2a0ecc58bb721f194f27d90de673caf9dc8587d54dd798935f827084cc8c18a89a150452fd980547378352bf6dcb129f1480ed2c4fd215ba283322290258e80ab9316e13140d021302c18a35c6a0e0b48696bbd89e9f12e0b88fc4ea75ca970de27eae89b4c2afa003291fb6d902c6", 0x99, 0x1}], 0x800, &(0x7f0000001940)={[{@part={'part', 0x3d, 0xfc9}}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@euid_gt={'euid>', r3}}, {@fowner_gt={'fowner>', r4}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@appraise='appraise'}]}) r5 = syz_open_dev$dmmidi(&(0x7f0000001a00)='/dev/dmmidi#\x00', 0x3, 0x220000) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000001a40)=""/210) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0x3ff, 0x4) setxattr$security_ima(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='security.ima\x00', &(0x7f0000001bc0)=@v2={0x7, 0x3, 0xd, 0x7, 0x1000, "eb29e4d07ae42fe0666e8057161bc5c2d3c34fa8f12cc26b71885ba5f916bbc7373dcb3ba23298e2de36fb826f493042dac64396b9927155baa55dc59e431e7769d3e5c9a4b736c75b70fed31a77cdd57752af19f7bd61206078230e1595fab1438b794d20cba0a2b32a383d8777de2af2abfc51da574f22a2552ddeb7e04704f397b354339241ffc64c25909c7e392fb38bf0b2a6525425fe4a0d29cd787120c1c6434c1665f5780b9656436d49c2f1458a80babe17793ed9f98b702f82d8f2baa151e3874b43f3b67a326c19f46c81bcb54ac1e73cd30083165db820517e9f057220503ef479990189db634f14746a2d9c19f181f0bd075cbf7ca12cc1019eaebccbd97fe13fd1541dda81949af506c61a0995e1392c436283d16df1002e2918d2e5036b9ff5bb961c44ea0ef7c2b1c1430ba5c976abd747a4dc75b5218124e5df7c2a22df219c6486fe1937be5d6d9e42e0cc3d6eb1134ce2464baab20a2d57e8d67ca50f66fb3664cb21a61bdd3135954be719326bb423a156880f9d31075d14d4fea9c3610953116841ecb9f349c57dcd7af41347c7968124c330ae5ef2bf7876657d3e5f36a4add4c1eb7d197449e17c1c4fdd2cfe065ad3bab15ef48cd6ea2e129658bbe96dbd2ed4ebe791296d47020289c38167d85284bdb8745cba7b2f35ad2bdfb4cb1991ea7433b301547d511d2ca2bb8c7f04aa2c0fca789593530cafe397aca5ee10daf2f22c7c454c727026eac4e13bf001041169cc76d919fae02a4020c978e1453592a41ba0d8e4137d3979b605816161174da5171ef8654824d279adede79a8ea7912c7e323ed51b26e32eb659326d7731259c9e3a99489783135ab06c4e1781cc395d677074ddf0a690c8a8677bd884910ac43762e3156e00d1ed19b1144aeb1f23c6d140df0ccda0ab8e911b181cafb1d607850a315d1cab4771312bdba23894553e3bfe83d5456e916d23de5fbfafc7bbea57e62e5cffc22e9ce8ef80e0283f975a329088e738d23c0969e57b5e3f9b9be5b432ec85c1219b3595cac348b3fee3203cf2a40f456be2dbff8004b21626bbb8eda5d3c21ac19d3391983498155aed9a598c69db1dd4c66dfa10eb7fe79c4a2175046f00edc354ad3607d4f26a33702b5e39f796ce44a2117cf3c9fbf7a2eeb3f59a3fde5733ce786e309e83ea3d7a9dba8b8825016216536a6af444590b48beee80d0ec92e7006210f52b868a52b3ba3793416062a019f494ddb0b19b533a2b5d969a8dafd6aafb679e2311f4c97b18bbf914a55979a59a64c4895ceec795d9e85265c5ec49cbce6db2b77da2adcb0ec6e277d09ffc7784e0e33f27847edffff0452cdbbd1ceb367d8ada95247ae86205351763f24aa948cf54a3a3817fc7a6f76497e6fb0dd1e5cccbefce6fa7dd889ea87bb2028e9c9049dc9259cad7c214cf9ae56388bbd15f1a5fb6a960eae8a73507191da496ddec11bd963bf2e9149ff94d1940c54ce65dc6b5fa593c16703609072edd47f0c6de71b76fad45eef129a0baf372c503f1cef130bfe38de2172267f7eebd2f74607134fbb0a22d174c4415501edc31b045ad001059041e4bfe743b33cc435db8d2c4434be52c8a9cbb803010ad3b418ce03abe0cbef6e62ef755cb357aad0ae9506000e8ff8529416e9337b35e5dca2bf352874b5e170480f4130b272781ebcf7882279f1f2fafc84a6a49602a0f54b35728f12efbc1f4bedc477065231d824ee4939ef8625e272e3f1fc4e94b8664c338c3fae49e8fc3a54699e7d7716587a79b6201e5e79e8046af6292d005985d4a00cebb257ecaed1f16fd1253702ad11929f53e791e65701bd5408d636419e0d333c6db919ebf7a8944472f8234511301555042411439f4d8fb2468f58cefffe2265ca834ff23ab290f2d1b44ca39dea7dff14ef6e3d509489a05c73bba097ecca8f1096893c6fc1ab2a5d17f2b3cb1f81e40bdeb8f41a1696c7379aa34ba07b26508cc183e505ffac819ba27a67c80e39e5d2d8808b699d4e2edef0a13d2e1d961be919e6beac2a4de291ec0d960bfe07f5ebd7b90b7234c3ee293dc13ba68eb3289775226aa81638381fd8ac08daf6da8eb05a1df97142fe939dd0af2d2f32c494b31c20a5627a247fb19d98ea4ff0a5d9c8883408d56587e2eec4c9c5daf53750915b9638a4c4b5576450aa0a594d4cfe0b1fa4d0349cd1f07423f2f2e46bc50a67f180e43e0597edb75a5c656648a1b031a7f351f3e42303cabc768305fe4e7221c321083e1d2609acde4a88f7e9b7370383a8dcafb6e3ddfc800a752f5b007f950059f44c0f2efcf0de1585e9f5cb9b9af9fa386af11b9abf3eabff1889855e4f6b845cc57119f767ba7887babce90d7c03cc5833f512368d3ae9a6c8072b18f8eec6b9598b1f649e4dec74346424a95ba414198010fe9f4793d9c0a11058d7f6e1780af0321c17916601f71723ab076d55d7eb0473de3b392abc6011990a866f7c497c6c50b84b46f58b8fdbc448d49343047349896367eae783658cff35de5e8e69a440e4a6c895514cd882d28d59ca934e8125396b59ed67019f458ebfdc00eadbb42c125148f6c665cb27c2a50ef9fe27735711f7943c4c02b2a1a9d4d15e7b90ef8c584dc17131c2df0d7fa47e90804d090ca9135f36bd27c06d97e692e95b7057be9116b5032382b796b1ea645736f6b106095327d3272fb3831d322954b4d5e1e0ff358e92d283cd2f3dee998260af13aa55336086c0897875ed22a390bc05f71ac4f7e3fac9ee778145f63008571c275de32b6be859ee7450fee3353fe4d083db3b4b5ba73a4794e032f454b6bfe58211970953a244a1b2724d8437c8e13aedeaa0f569edb392747e5b8edd6ee007a309ba8f974be832a9ad71d031fe8a01a0ad877c0543f88d8f5384e511a60789ebe914c2d006669ce36735fb14cefcfdf6a75d618b32996fdc96200d70361ee44d071ab5ff29a5f3950dfc67682b1aa399fd8b91a921c52652a34773ad5982847655144b3c863b07adc434d035ca26b8e1cdc1f077afe0b7811dba85e1a29e3ba4f480818ae8f62677136bcc5255e82b24b69de70a822f9c960c24cd63d15806d9d60402f03b096589cb7da0105ca368ed20c05ed03ec14971522d1426274998a5bdfea2e463f54f0dd291c59b40525b68267ce01c49fddfd87a1c9a8e3f3a1d4b74e6d5fa8a5339602e658143b03b0caaf32b8e611e2acc6c7f5b5af03b95496ed2fce782a4c75a5a7b997477bc2599513e292f2dd5386c671dc21b3bd6129391c19c16c3992dc93e9fbc6cebf32e128a2e053c6436185da407024d687aa6d7f26a75989aa5ef09816590a66cfc7f9b50adcf560cf4a525df5946c10abb3f9ded2360e38c90a52aa341d915d23bc336d55b0bdcd08dd3138a70518eaac918b7ee2b391beddea1700d0fdd8696dc8e5257c755d988514eb14e49c87ab6508d5b7246ae22135694d24e3fd1062bdf7247933213c574320dd863096fec409099ac7586442f958d6691a71938c00d81a7a14736d4a3a617f6acd5bfccf62cc2371351618994b34369a162e5ac45ff33152c0e3aaa7568cd0e20689e1cff13a46f5eb6f0369c15319793424991feebbc319c5433cad0d25c834eeba071d98cded85ce73459850777c3acbd65f1075b20b6967ecd0ce7ce0de0c2a961940113abd8a034112768eeb8e7cacff19b4a1649a584c2a36fef864e386377ecf47e055cf422a50b2d56a1f5375ec3413978cf84bce03b749f6637751e348e3836facbe9b5bf1ffa2ddbe3371ab67ac07b765d97b70f6f3b8cc45e774e7e162d1d4dbcb5b0cb59627d54f32e54d3bf3aa13095c0f417490dd85753d87ce78585b38e5fae63e89cb77d405bbf39abac97e995b667598b7a3786bbcf7644e7af51af2a729bbd4c95d7c85f9c9c3e6dc0418c1f5c04ed5bc9ff489416d2dfffbd97b310274749fef2024daaa0623297ebd63e2d5bb70d4c7f775f06cae67b08e57f5db8263544e74a42d6af44d79b91217d660d19ef2a3073541475df05479c26da008f36954df20b65a30772213740e11ee2d7c15eb873a36faf98771975443a1b4c8b75ab831457bf9ae2944da892df11616c3a3ae65550ce2a4b3bea51ae6c856c655ed2284ea1c79b630f653e4cc43a9522edf9fc3fdd15269201fb94cecd8d0dd3e1047fb979d4d4276a4d80dfe3b6d38a3a3c41016918c87a59a844242d060babebc56ee13ab9f154e7f90310296eab85ba22d5394398945dde2ec2c42bfe26846ecf2f37a6b353648a70f641f77ce835f6f0fe1513fba140b0db5d7cb798bc326fd9606fa278116beaabb51e2f8e9ddeffa98eed2115d7b1ecae4a95915bc28ecde56382d2c3a6f494317822222e3f6b49cdd69c1e1ef67cc73b847140ee7382df50f27ba20cf8d7b948b6ba71d32fffc25bb14c3cb5db0bd47041afdefe0e067c20ad6f73d9fbb4ca0eacc78ddc1a3837b737e74822906d3f279c844340faee4b1297dd99ba5331b2ff870f046d9cc7960578971bbebf6960e027d7ae684ba8ceb6aa2051047e054af9c664b058c7142d9689426cd9b45a75a2a108bcd834e8d73e5ef61c866f7a7f81071775668ecb30a8a59a55da1038ca063d81586059776f7fd1f52361747794f8e54d849774842c25ce8e733387b1ebd8ff1c6f14ba94ebb7bc47779140a46f05bf1ca758d9520363f0b97d7adf753457834aa3d30cfd7d53822b949e5633712659e73d7af178e62770edba597f766ae9291783c148a207071a7c63d67e8318f5a944b2dd0dcf97ccbcbc6aea911fba8938644224e357370c4aa34e7a608b7e07083d761d2b59bd897d2ce6d2e0c69b45179236eb94306d7c9e722a1ed1e534dab8be01a95e04cd65530b31be2022470a9bbde914fcc35cd40783fcbeb6218aa83118e691301cf7773a4d9ff09cf51ec03e00800ce44cbfb0aae101f7cc58a81e45801a1e447f23cd83bfb446d1ab54c12f63ace1cbddad58e75761f13d1f9e085301cbed8347615bbfbf1a5a03867329c7a2da827b55989bef4863575af1ff6ca8e2c3429ef4c13cc92560401b9a4cb339dc22a304b52762453b636edfb77e4777bca95f68b710529cd5c438ec345243ea75e5640f5048156f27a11dce09e7612b10846bf73fa2f51c3e6805172f6e766250ed7f0f7d98f83c5f348c467bbb7fa767f2d003e2f0c5f96bb9263c4d39b89ca989389bf94f210c4fe08dc784f8036739b06656de0e4418bc91209b9910b94c099c753c2d65bfe0f5082a85d97afdb50d810904bf1f0e103449d7ca9aa1dc480016f497bc4d94e6be278ba56703cb87cbdc9a351c03e797f31392550b7034a288d104fc8f81bb9b2d7a1788849aebd033d139a961e315f00316115a9e0fc5d0016a079651fe0b8c00b3985f4e70398e780ba196a8ec21de4c1227a1c094a06555caf82b66232022d5bbdfba8b2b43dabf32a17e356dcd0cab0573a7a9cdabd8c02d02c6c826f257c03738a0712d37916f0d59f82b8606a3d25b28cfb9d2e67d9a254f00e2f75f3c93cfb8a986351d8319a9b6c112d199a1a9ca03f18ad34eba4b4affdd713672e19dfa1f59ad7383afda247ab18210c00ec6a95ff4226e212afb0b09185de528c07c930fa3b48eba0e0ed69a34c3fa127c4befa93a4062a361f73274504bcb69b16ebeaa533891aa09be2d325e5535bac1cd81185240ac1b6dbeb760daa298a269c201e57799d628f2a4322f19b9f4e4b6ccdb9a49cf8f2699b948ce0d0635ea99fcc1cc42d54630dec6a29"}, 0x100a, 0x1) getsockopt$inet_buf(r5, 0x0, 0x2e, &(0x7f0000002c00)=""/101, &(0x7f0000002c80)=0x65) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f0000002cc0)) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000002d00)={0x3, 0xffffffffffffff6f}) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000002d40)={0x4, 0x9, 0xffffffff00000000, 0x1800000000000000, 0x7}) r6 = syz_open_dev$adsp(&(0x7f0000002d80)='/dev/adsp#\x00', 0x10000, 0x208301) ioctl$TCSETAF(r6, 0x5408, &(0x7f0000002dc0)={0x5, 0x9, 0xcdb, 0x1ff, 0x7574, 0x4, 0x2, 0x2, 0xf3f, 0x4}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000002e00), 0x4) accept4$nfc_llcp(r5, 0x0, &(0x7f0000002e40), 0x80000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000002e80)={0x2, [0x7, 0x5fb3]}, 0x8) ioctl$BLKIOMIN(r6, 0x1278, &(0x7f0000002ec0)) ioctl$SIOCGIFMTU(r6, 0x8921, &(0x7f0000002f00)) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000002f40)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000002f80)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000003080)=0xe8) ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x4092) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000030c0)={0x0, 0x7}, &(0x7f0000003100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000003140)={r7, 0x7a, "c33f24843bfe7750a79893f5d396ce60d9821aba2a5a1613edb76bf6f9bd18438f82a76f23296307c8e567e4a042e3c573ae3d9b581c1ca88b043891bab1b2866717bede02b938fee775770f382cd06ef264f51005b5242d8a4212cc1f123670e67d5301a8f9516e13b30742fbe1ac4a25ef8e9677dd03bb4d9b"}, &(0x7f0000003200)=0x82) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000003240)={0x0, @aes256, 0x2, "09108780db85b4c6"}) syz_genetlink_get_family_id$fou(&(0x7f0000003280)='fou\x00') ioprio_set$pid(0x3, r1, 0x2) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000032c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r6, 0x40086424, &(0x7f0000003300)={r8, 0x1}) 17:49:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 344.167859] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 344.175129] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 344.182392] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 344.189670] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 344.221616] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:49:09 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 344.315832] hfs: unable to parse mount options 17:49:09 executing program 2 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 344.337586] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 344.436140] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 344.490647] FAULT_INJECTION: forcing a failure. [ 344.490647] name failslab, interval 1, probability 0, space 0, times 0 [ 344.565898] CPU: 1 PID: 13843 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 344.574452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.583817] Call Trace: [ 344.586431] dump_stack+0x244/0x39d [ 344.590106] ? dump_stack_print_info.cold.1+0x20/0x20 [ 344.595325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.600892] should_fail.cold.4+0xa/0x17 [ 344.604971] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 344.610093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.615641] ? wake_up_klogd+0x11a/0x180 [ 344.619719] ? console_device+0xc0/0xc0 [ 344.623717] ? __down_trylock_console_sem+0x151/0x1f0 [ 344.628921] ? zap_class+0x640/0x640 [ 344.632649] ? vprintk_emit+0x293/0x990 [ 344.636654] ? find_held_lock+0x36/0x1c0 [ 344.640733] ? __lock_is_held+0xb5/0x140 [ 344.644825] ? perf_trace_sched_process_exec+0x860/0x860 [ 344.650286] ? vprintk_default+0x28/0x30 [ 344.654364] __should_failslab+0x124/0x180 [ 344.658620] should_failslab+0x9/0x14 [ 344.662443] kmem_cache_alloc_trace+0x2d7/0x750 [ 344.667151] kobject_uevent_env+0x2f3/0x101e [ 344.667196] kobject_uevent+0x1f/0x24 [ 344.667215] lo_ioctl+0x1385/0x1d60 [ 344.667238] ? lo_rw_aio+0x1ef0/0x1ef0 [ 344.682975] blkdev_ioctl+0x9ac/0x2010 [ 344.686878] ? blkpg_ioctl+0xc10/0xc10 [ 344.686895] ? lock_downgrade+0x900/0x900 [ 344.686910] ? check_preemption_disabled+0x48/0x280 [ 344.686934] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 344.686954] ? kasan_check_read+0x11/0x20 [ 344.709049] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 344.714370] ? rcu_softirq_qs+0x20/0x20 [ 344.718376] ? __fget+0x4d1/0x740 [ 344.721852] ? ksys_dup3+0x680/0x680 [ 344.725608] block_ioctl+0xee/0x130 [ 344.729252] ? blkdev_fallocate+0x400/0x400 [ 344.733600] do_vfs_ioctl+0x1de/0x1720 [ 344.737524] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 344.743109] ? ioctl_preallocate+0x300/0x300 [ 344.747533] ? __fget_light+0x2e9/0x430 [ 344.751532] ? fget_raw+0x20/0x20 [ 344.755009] ? rcu_read_lock_sched_held+0x14f/0x180 [ 344.760040] ? kmem_cache_free+0x24f/0x290 [ 344.764297] ? putname+0xf7/0x130 [ 344.767770] ? do_syscall_64+0x9a/0x820 [ 344.771761] ? do_syscall_64+0x9a/0x820 [ 344.775749] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 344.780347] ? security_file_ioctl+0x94/0xc0 [ 344.780369] ksys_ioctl+0xa9/0xd0 [ 344.780391] __x64_sys_ioctl+0x73/0xb0 [ 344.780409] do_syscall_64+0x1b9/0x820 [ 344.780430] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 344.788296] ? syscall_return_slowpath+0x5e0/0x5e0 [ 344.788314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.788334] ? trace_hardirqs_on_caller+0x310/0x310 17:49:09 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:09 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) recvfrom$packet(r0, &(0x7f0000000000)=""/132, 0x84, 0x10000, 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:09 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x20080, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000002c0)) bind$can_raw(r4, &(0x7f0000000340), 0xe0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x0, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) r7 = getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, r7) 17:49:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:09 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:09 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 344.788351] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 344.788370] ? prepare_exit_to_usermode+0x291/0x3b0 [ 344.788396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.806433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.806447] RIP: 0033:0x4573d7 [ 344.806464] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.806478] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:49:09 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 344.836352] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 344.836363] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 344.836372] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 344.836382] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 344.836392] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:10 executing program 2 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:10 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:10 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='htcp\x00', 0x5) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='J'], 0x1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) fremovexattr(r0, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00') sendto$inet(r0, &(0x7f0000000000)="0f69b8269778042ed4e6b1a484e6dc96d5b84a5286df3975657750b4b1c0d04528ac522cecdd3f639653ff69e119c9aa41e18d10fda6eaf7b294a522b6abe0b1ef6dd62235ba28ada0e5ab77eae0dcd0c07e4b656f6cbb7b1e0967cb9ac51e1dc9ed86d6760884", 0x67, 0x20000000, &(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) [ 345.164524] FAULT_INJECTION: forcing a failure. [ 345.164524] name failslab, interval 1, probability 0, space 0, times 0 [ 345.225860] CPU: 0 PID: 13906 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 345.234385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.243747] Call Trace: [ 345.246364] dump_stack+0x244/0x39d [ 345.250021] ? dump_stack_print_info.cold.1+0x20/0x20 [ 345.255237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.260832] should_fail.cold.4+0xa/0x17 [ 345.264918] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.270064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.275611] ? wake_up_klogd+0x11a/0x180 [ 345.279689] ? console_device+0xc0/0xc0 [ 345.283683] ? __down_trylock_console_sem+0x151/0x1f0 [ 345.288906] ? zap_class+0x640/0x640 [ 345.292631] ? vprintk_emit+0x293/0x990 [ 345.296630] ? find_held_lock+0x36/0x1c0 [ 345.300710] ? __lock_is_held+0xb5/0x140 [ 345.300743] ? perf_trace_sched_process_exec+0x860/0x860 [ 345.300793] ? vprintk_default+0x28/0x30 [ 345.310353] __should_failslab+0x124/0x180 [ 345.310375] should_failslab+0x9/0x14 17:49:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 345.310423] kmem_cache_alloc_trace+0x2d7/0x750 [ 345.310449] kobject_uevent_env+0x2f3/0x101e [ 345.331602] kobject_uevent+0x1f/0x24 [ 345.335422] lo_ioctl+0x1385/0x1d60 [ 345.339076] ? lo_rw_aio+0x1ef0/0x1ef0 [ 345.342996] blkdev_ioctl+0x9ac/0x2010 [ 345.346967] ? blkpg_ioctl+0xc10/0xc10 [ 345.350893] ? lock_downgrade+0x900/0x900 [ 345.355047] ? check_preemption_disabled+0x48/0x280 [ 345.360138] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 345.365084] ? kasan_check_read+0x11/0x20 [ 345.369248] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 345.374550] ? rcu_softirq_qs+0x20/0x20 [ 345.378618] ? __fget+0x4d1/0x740 [ 345.382098] ? ksys_dup3+0x680/0x680 [ 345.385856] block_ioctl+0xee/0x130 [ 345.389505] ? blkdev_fallocate+0x400/0x400 [ 345.394883] do_vfs_ioctl+0x1de/0x1720 [ 345.398835] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 345.404389] ? ioctl_preallocate+0x300/0x300 [ 345.408817] ? __fget_light+0x2e9/0x430 [ 345.412807] ? fget_raw+0x20/0x20 [ 345.416275] ? rcu_read_lock_sched_held+0x14f/0x180 [ 345.416294] ? kmem_cache_free+0x24f/0x290 [ 345.416311] ? putname+0xf7/0x130 [ 345.429023] ? do_syscall_64+0x9a/0x820 [ 345.433018] ? do_syscall_64+0x9a/0x820 [ 345.437011] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 345.441613] ? security_file_ioctl+0x94/0xc0 [ 345.446042] ksys_ioctl+0xa9/0xd0 [ 345.449519] __x64_sys_ioctl+0x73/0xb0 [ 345.453442] do_syscall_64+0x1b9/0x820 [ 345.457376] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 345.462774] ? syscall_return_slowpath+0x5e0/0x5e0 [ 345.467717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.472642] ? trace_hardirqs_on_caller+0x310/0x310 [ 345.477690] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 345.482722] ? prepare_exit_to_usermode+0x291/0x3b0 [ 345.487762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.492640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.497844] RIP: 0033:0x4573d7 [ 345.501050] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.519971] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.527693] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 345.534969] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 345.542248] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 345.549523] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 345.549533] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:10 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x20080, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000002c0)) bind$can_raw(r4, &(0x7f0000000340), 0xe0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x0, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) r7 = getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, r7) 17:49:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:10 executing program 4: utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xec1, 0x83}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = shmget$private(0x0, 0x3000, 0x78001920, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x3000) r2 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:10 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:10 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0x1ff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="cf0ce32ac42cea57d96b2989fcfc05c8366e33dab27778f02bbb9ac061a5ee71e8398d016d9e16b687b674456ed02cf523f3c2300a"], 0x1) 17:49:10 executing program 2 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:10 executing program 3: pselect6(0x3a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000003440), &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:10 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 345.863506] FAULT_INJECTION: forcing a failure. [ 345.863506] name failslab, interval 1, probability 0, space 0, times 0 17:49:11 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[], 0x0) [ 345.946955] CPU: 1 PID: 13959 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 345.955508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.964871] Call Trace: [ 345.967492] dump_stack+0x244/0x39d [ 345.971149] ? dump_stack_print_info.cold.1+0x20/0x20 [ 345.976363] ? is_bpf_text_address+0xd3/0x170 [ 345.980887] should_fail.cold.4+0xa/0x17 [ 345.984973] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.990113] ? zap_class+0x640/0x640 [ 345.993842] ? save_stack+0x43/0xd0 [ 345.997486] ? kasan_kmalloc+0xc7/0xe0 [ 346.001387] ? kmem_cache_alloc_trace+0x152/0x750 [ 346.006241] ? kobject_uevent_env+0x2f3/0x101e [ 346.010832] ? kobject_uevent+0x1f/0x24 [ 346.010850] ? lo_ioctl+0x1385/0x1d60 [ 346.010874] ? find_held_lock+0x36/0x1c0 [ 346.010894] ? __lock_is_held+0xb5/0x140 [ 346.018679] ? perf_trace_sched_process_exec+0x860/0x860 [ 346.018709] __should_failslab+0x124/0x180 [ 346.018730] should_failslab+0x9/0x14 [ 346.040296] __kmalloc+0x2e0/0x760 [ 346.043857] ? kobject_uevent_env+0x2f3/0x101e [ 346.048461] ? rcu_read_lock_sched_held+0x14f/0x180 [ 346.053493] ? kobject_get_path+0xc2/0x1b0 [ 346.057739] ? kmem_cache_alloc_trace+0x353/0x750 [ 346.062607] kobject_get_path+0xc2/0x1b0 [ 346.066691] kobject_uevent_env+0x314/0x101e [ 346.071126] kobject_uevent+0x1f/0x24 [ 346.071148] lo_ioctl+0x1385/0x1d60 [ 346.071173] ? lo_rw_aio+0x1ef0/0x1ef0 [ 346.078597] blkdev_ioctl+0x9ac/0x2010 [ 346.078619] ? blkpg_ioctl+0xc10/0xc10 [ 346.078635] ? lock_downgrade+0x900/0x900 [ 346.078650] ? check_preemption_disabled+0x48/0x280 [ 346.078678] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 346.094463] ? kasan_check_read+0x11/0x20 [ 346.104403] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 346.104423] ? rcu_softirq_qs+0x20/0x20 [ 346.104452] ? __fget+0x4d1/0x740 [ 346.121276] ? ksys_dup3+0x680/0x680 [ 346.125013] block_ioctl+0xee/0x130 [ 346.128648] ? blkdev_fallocate+0x400/0x400 [ 346.132976] do_vfs_ioctl+0x1de/0x1720 [ 346.136873] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 346.142420] ? ioctl_preallocate+0x300/0x300 [ 346.146836] ? __fget_light+0x2e9/0x430 [ 346.150814] ? fget_raw+0x20/0x20 [ 346.154271] ? rcu_read_lock_sched_held+0x14f/0x180 [ 346.159292] ? kmem_cache_free+0x24f/0x290 [ 346.163528] ? putname+0xf7/0x130 [ 346.166996] ? do_syscall_64+0x9a/0x820 [ 346.170971] ? do_syscall_64+0x9a/0x820 [ 346.174947] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 346.179535] ? security_file_ioctl+0x94/0xc0 [ 346.183960] ksys_ioctl+0xa9/0xd0 [ 346.187421] __x64_sys_ioctl+0x73/0xb0 [ 346.191316] do_syscall_64+0x1b9/0x820 [ 346.195205] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 346.200580] ? syscall_return_slowpath+0x5e0/0x5e0 [ 346.205516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.210380] ? trace_hardirqs_on_caller+0x310/0x310 [ 346.215404] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 346.220424] ? prepare_exit_to_usermode+0x291/0x3b0 [ 346.225451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.230303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.235495] RIP: 0033:0x4573d7 [ 346.238694] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.257600] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.265307] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 346.272589] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 346.279856] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 346.287122] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 346.294389] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:11 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x30202, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x0, 0x1, [0x5]}, &(0x7f0000000040)=0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0xfc5}, &(0x7f00000000c0)=0x8) fchdir(0xffffffffffffffff) r2 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8d904f00121f44dac8353c6c2295922e571d48934600000000b11c496e490d56e0a60ba021ba2892433d698b5a689a005882b4436c12665e277150916f02616cfbee22ce211e2a88f668cc00000000000000", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR, @ANYRESOCT=r2, @ANYRESDEC=r0], @ANYRES64=0x0, @ANYRES32=r2, @ANYBLOB="98c0", @ANYRES32=r2, @ANYRESHEX=0x0], @ANYBLOB, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES64=r2, @ANYRES32=r2, @ANYRESDEC=r0], @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES16=r0], @ANYRES32=r2], 0x100000306) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 17:49:11 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0xfefdffff00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:11 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x9, 0x10000) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000300)) chdir(&(0x7f0000000340)='./file0\x00') ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000003c0)=0x100000000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000000c0), 0x5, 0x2) ioperm(0x0, 0x1ff, 0x8) getsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000380), &(0x7f0000001540)=0x4) write$P9_RATTACH(r2, &(0x7f0000000540)={0x14}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x100d}}, 0x20) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000000240)={0x79}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f00000007c0)={"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"}) ioctl$KVM_SET_VAPIC_ADDR(r6, 0x4008ae93, &(0x7f0000000000)=0xefff) bind(0xffffffffffffffff, &(0x7f0000000c00)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001400)={0x8, 0x120, 0xfa00, {0x3, {0x7e, 0x7fff, "18dbb0a80b45c8a52039761f797aa4c1c12ebe6aa655a26eabcfb106c567fd358aebe99f705f8fdf65732673c1ae85f21ba3f72c8d87b8215a668397351a3bda3f4446f7c70238b889344b99148082c4fd100cb2c057d00ed40e1d4ea5ed473b899795144fbcbf1d5e7d49059fc7a149c16bffb3e3a7496657923e346ab93b912c50fcf38db401ef0f779930f4ba2ebdec24baf8e89e58f53cab9e95aae9703a4c77077841d1c493cd3e82b4092ec429fdd4568b6f89826d4e181ce1046ff7af7c77678760cde3de1e7aa46adb5c4636f253a74aa994e6f3919e97f8d30630ecb044fe63112ba8d0eee383fc79194fa7ce65ed950bb138bcd85817547f102eaf", 0x3b, 0x9e, 0x7, 0x0, 0x0, 0x0, 0x20, 0x1}, r3}}, 0x128) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000015c0)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0xffffffffffffffc2}, &(0x7f00000001c0)=0x8) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000240)=0x4) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 17:49:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:11 executing program 2 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432c0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:11 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 346.599036] FAULT_INJECTION: forcing a failure. [ 346.599036] name failslab, interval 1, probability 0, space 0, times 0 [ 346.646086] CPU: 1 PID: 14006 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 346.654622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.663982] Call Trace: [ 346.666592] dump_stack+0x244/0x39d [ 346.670251] ? dump_stack_print_info.cold.1+0x20/0x20 [ 346.675494] ? is_bpf_text_address+0xd3/0x170 [ 346.680023] should_fail.cold.4+0xa/0x17 [ 346.684115] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 346.689248] ? zap_class+0x640/0x640 [ 346.692981] ? save_stack+0x43/0xd0 [ 346.696624] ? kasan_kmalloc+0xc7/0xe0 [ 346.700525] ? kmem_cache_alloc_trace+0x152/0x750 [ 346.705391] ? kobject_uevent_env+0x2f3/0x101e [ 346.710012] ? kobject_uevent+0x1f/0x24 [ 346.714001] ? lo_ioctl+0x1385/0x1d60 [ 346.717820] ? find_held_lock+0x36/0x1c0 [ 346.721903] ? __lock_is_held+0xb5/0x140 [ 346.725999] ? perf_trace_sched_process_exec+0x860/0x860 [ 346.731478] __should_failslab+0x124/0x180 [ 346.735733] should_failslab+0x9/0x14 [ 346.739553] __kmalloc+0x2e0/0x760 [ 346.743121] ? kobject_uevent_env+0x2f3/0x101e [ 346.747724] ? rcu_read_lock_sched_held+0x14f/0x180 [ 346.752757] ? kobject_get_path+0xc2/0x1b0 [ 346.757004] ? kmem_cache_alloc_trace+0x353/0x750 [ 346.761869] kobject_get_path+0xc2/0x1b0 [ 346.765951] kobject_uevent_env+0x314/0x101e [ 346.770386] kobject_uevent+0x1f/0x24 [ 346.774211] lo_ioctl+0x1385/0x1d60 [ 346.777864] ? lo_rw_aio+0x1ef0/0x1ef0 [ 346.781778] blkdev_ioctl+0x9ac/0x2010 [ 346.785689] ? blkpg_ioctl+0xc10/0xc10 [ 346.789601] ? lock_downgrade+0x900/0x900 [ 346.793762] ? check_preemption_disabled+0x48/0x280 [ 346.798798] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 346.803743] ? kasan_check_read+0x11/0x20 [ 346.807910] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 346.813231] ? rcu_softirq_qs+0x20/0x20 [ 346.817233] ? __fget+0x4d1/0x740 [ 346.820709] ? ksys_dup3+0x680/0x680 [ 346.824454] block_ioctl+0xee/0x130 [ 346.828100] ? blkdev_fallocate+0x400/0x400 [ 346.832441] do_vfs_ioctl+0x1de/0x1720 [ 346.836353] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 346.841922] ? ioctl_preallocate+0x300/0x300 [ 346.846345] ? __fget_light+0x2e9/0x430 [ 346.850334] ? fget_raw+0x20/0x20 [ 346.853805] ? rcu_read_lock_sched_held+0x14f/0x180 [ 346.858839] ? kmem_cache_free+0x24f/0x290 [ 346.863095] ? putname+0xf7/0x130 [ 346.866579] ? do_syscall_64+0x9a/0x820 [ 346.870578] ? do_syscall_64+0x9a/0x820 [ 346.874578] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 346.879179] ? security_file_ioctl+0x94/0xc0 [ 346.883611] ksys_ioctl+0xa9/0xd0 [ 346.887086] __x64_sys_ioctl+0x73/0xb0 [ 346.890994] do_syscall_64+0x1b9/0x820 [ 346.894897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 346.900279] ? syscall_return_slowpath+0x5e0/0x5e0 [ 346.905222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.910092] ? trace_hardirqs_on_caller+0x310/0x310 [ 346.915124] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 346.920160] ? prepare_exit_to_usermode+0x291/0x3b0 [ 346.925199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.930063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.935272] RIP: 0033:0x4573d7 [ 346.938476] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.957589] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.965311] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 346.972595] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 346.979874] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 346.987153] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:49:12 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0xfefdffff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 346.994432] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 347.053365] EXT4-fs: 9 callbacks suppressed [ 347.053414] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:12 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0xffc99a3b}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 347.252158] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:49:12 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r3 = getpid() setpgid(r2, r3) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="062f327496a2fcf6e9cfc11f0b8b48bb693570c29960210a9d872cd5772ccbc3caa83da92da54489fd0260c701df7b6bdd49ce4cd69c27434332b5af1ece5ba531704456d13bee5376ef292cca01124c93fb2dbe92d2c886f6a3d3f6b35b79333aca54c5a97101c1d349d9995a0468c51aa298fca478522b7325066a5298ed7e5bdc801b9547c7bc3869"], 0x1) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000000)) 17:49:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:12 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:12 executing program 2 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:12 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x9, 0x10000) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000300)) chdir(&(0x7f0000000340)='./file0\x00') ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000003c0)=0x100000000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000000c0), 0x5, 0x2) ioperm(0x0, 0x1ff, 0x8) getsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000380), &(0x7f0000001540)=0x4) write$P9_RATTACH(r2, &(0x7f0000000540)={0x14}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x100d}}, 0x20) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000000240)={0x79}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f00000007c0)={"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"}) ioctl$KVM_SET_VAPIC_ADDR(r6, 0x4008ae93, &(0x7f0000000000)=0xefff) bind(0xffffffffffffffff, &(0x7f0000000c00)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001400)={0x8, 0x120, 0xfa00, {0x3, {0x7e, 0x7fff, "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", 0x3b, 0x9e, 0x7, 0x0, 0x0, 0x0, 0x20, 0x1}, r3}}, 0x128) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000015c0)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0xffffffffffffffc2}, &(0x7f00000001c0)=0x8) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000240)=0x4) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 347.557701] FAULT_INJECTION: forcing a failure. [ 347.557701] name failslab, interval 1, probability 0, space 0, times 0 [ 347.580735] CPU: 0 PID: 14052 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 347.589259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.598689] Call Trace: [ 347.601300] dump_stack+0x244/0x39d [ 347.604937] ? dump_stack_print_info.cold.1+0x20/0x20 [ 347.610136] ? lock_downgrade+0x900/0x900 [ 347.614299] should_fail.cold.4+0xa/0x17 [ 347.618371] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 347.623481] ? rcu_softirq_qs+0x20/0x20 [ 347.627460] ? unwind_dump+0x190/0x190 [ 347.631360] ? is_bpf_text_address+0xd3/0x170 [ 347.635864] ? zap_class+0x640/0x640 [ 347.639595] ? __kernel_text_address+0xd/0x40 [ 347.644097] ? unwind_get_return_address+0x61/0xa0 [ 347.649035] ? find_held_lock+0x36/0x1c0 [ 347.653105] ? __lock_is_held+0xb5/0x140 [ 347.657173] ? __irqentry_text_end+0x1c0480/0x1f9688 [ 347.662293] ? kobject_uevent+0x1f/0x24 [ 347.666278] ? perf_trace_sched_process_exec+0x860/0x860 [ 347.671729] ? do_vfs_ioctl+0x1de/0x1720 [ 347.675788] ? ksys_ioctl+0xa9/0xd0 [ 347.679417] ? __x64_sys_ioctl+0x73/0xb0 [ 347.683484] ? do_syscall_64+0x1b9/0x820 [ 347.687575] __should_failslab+0x124/0x180 [ 347.691821] should_failslab+0x9/0x14 [ 347.695633] kmem_cache_alloc+0x2be/0x730 [ 347.699874] skb_clone+0x1bb/0x500 [ 347.703430] ? skb_split+0x11e0/0x11e0 [ 347.707322] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 347.712400] ? netlink_trim+0x1b4/0x380 [ 347.716384] ? netlink_skb_destructor+0x210/0x210 [ 347.721248] netlink_broadcast_filtered+0x110f/0x1680 [ 347.726455] ? __netlink_sendskb+0xd0/0xd0 [ 347.730716] ? kasan_check_read+0x11/0x20 [ 347.734878] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 347.740166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.745717] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 347.751179] ? refcount_add_not_zero_checked+0x330/0x330 [ 347.756643] ? netlink_has_listeners+0x2cb/0x4a0 [ 347.761426] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 347.766478] netlink_broadcast+0x3a/0x50 [ 347.770574] kobject_uevent_env+0xa83/0x101e [ 347.775003] kobject_uevent+0x1f/0x24 [ 347.778815] lo_ioctl+0x1385/0x1d60 [ 347.782455] ? lo_rw_aio+0x1ef0/0x1ef0 [ 347.786350] blkdev_ioctl+0x9ac/0x2010 [ 347.790249] ? blkpg_ioctl+0xc10/0xc10 [ 347.794143] ? lock_downgrade+0x900/0x900 [ 347.798291] ? check_preemption_disabled+0x48/0x280 [ 347.803325] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 347.808262] ? kasan_check_read+0x11/0x20 [ 347.812418] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 347.817706] ? rcu_softirq_qs+0x20/0x20 [ 347.821684] ? __fget+0x4d1/0x740 [ 347.825145] ? ksys_dup3+0x680/0x680 [ 347.828877] block_ioctl+0xee/0x130 [ 347.832511] ? blkdev_fallocate+0x400/0x400 [ 347.836853] do_vfs_ioctl+0x1de/0x1720 [ 347.840753] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 347.846300] ? ioctl_preallocate+0x300/0x300 [ 347.850714] ? __fget_light+0x2e9/0x430 [ 347.854697] ? fget_raw+0x20/0x20 [ 347.858158] ? rcu_read_lock_sched_held+0x14f/0x180 [ 347.863182] ? kmem_cache_free+0x24f/0x290 [ 347.867421] ? putname+0xf7/0x130 [ 347.870881] ? do_syscall_64+0x9a/0x820 [ 347.874857] ? do_syscall_64+0x9a/0x820 [ 347.878841] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 347.883433] ? security_file_ioctl+0x94/0xc0 [ 347.887851] ksys_ioctl+0xa9/0xd0 [ 347.891314] __x64_sys_ioctl+0x73/0xb0 [ 347.896166] do_syscall_64+0x1b9/0x820 [ 347.900059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 347.905433] ? syscall_return_slowpath+0x5e0/0x5e0 [ 347.910365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.915216] ? trace_hardirqs_on_caller+0x310/0x310 [ 347.920238] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 347.925263] ? prepare_exit_to_usermode+0x291/0x3b0 [ 347.930294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.935150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.940343] RIP: 0033:0x4573d7 17:49:13 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 347.943540] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.962464] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.970185] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 347.977461] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 347.984740] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 347.992014] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 347.999287] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 348.017476] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:13 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0xfefdffff00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 348.059657] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 348.098140] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:13 executing program 2 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:13 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 348.233948] FAULT_INJECTION: forcing a failure. [ 348.233948] name failslab, interval 1, probability 0, space 0, times 0 [ 348.245461] CPU: 1 PID: 14074 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 348.253970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.253978] Call Trace: [ 348.254005] dump_stack+0x244/0x39d [ 348.254031] ? dump_stack_print_info.cold.1+0x20/0x20 [ 348.254054] ? lock_downgrade+0x900/0x900 [ 348.278986] should_fail.cold.4+0xa/0x17 [ 348.283081] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 348.283102] ? rcu_softirq_qs+0x20/0x20 [ 348.283120] ? unwind_dump+0x190/0x190 [ 348.292224] ? is_bpf_text_address+0xd3/0x170 [ 348.292244] ? zap_class+0x640/0x640 [ 348.304334] ? __kernel_text_address+0xd/0x40 [ 348.304352] ? unwind_get_return_address+0x61/0xa0 [ 348.304375] ? find_held_lock+0x36/0x1c0 [ 348.317861] ? __lock_is_held+0xb5/0x140 [ 348.321943] ? kobject_uevent+0x1f/0x24 [ 348.325927] ? perf_trace_sched_process_exec+0x860/0x860 [ 348.331385] ? do_vfs_ioctl+0x1de/0x1720 [ 348.335450] ? ksys_ioctl+0xa9/0xd0 [ 348.339082] ? __x64_sys_ioctl+0x73/0xb0 [ 348.343133] ? do_syscall_64+0x1b9/0x820 [ 348.347191] __should_failslab+0x124/0x180 [ 348.351422] should_failslab+0x9/0x14 [ 348.355230] kmem_cache_alloc+0x2be/0x730 [ 348.359388] skb_clone+0x1bb/0x500 [ 348.362921] ? skb_split+0x11e0/0x11e0 [ 348.366801] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 348.371809] ? netlink_trim+0x1b4/0x380 [ 348.375794] ? netlink_skb_destructor+0x210/0x210 [ 348.380654] netlink_broadcast_filtered+0x110f/0x1680 [ 348.385854] ? __netlink_sendskb+0xd0/0xd0 [ 348.390096] ? kasan_check_read+0x11/0x20 [ 348.394240] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 348.399512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.405055] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 348.410520] ? refcount_add_not_zero_checked+0x330/0x330 [ 348.415963] ? netlink_has_listeners+0x2cb/0x4a0 [ 348.420711] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 348.425743] netlink_broadcast+0x3a/0x50 [ 348.429801] kobject_uevent_env+0xa83/0x101e [ 348.434395] kobject_uevent+0x1f/0x24 [ 348.438193] lo_ioctl+0x1385/0x1d60 [ 348.441818] ? lo_rw_aio+0x1ef0/0x1ef0 [ 348.445697] blkdev_ioctl+0x9ac/0x2010 [ 348.449584] ? blkpg_ioctl+0xc10/0xc10 [ 348.453462] ? lock_downgrade+0x900/0x900 [ 348.457598] ? check_preemption_disabled+0x48/0x280 [ 348.462610] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 348.467528] ? kasan_check_read+0x11/0x20 [ 348.471693] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 348.476962] ? rcu_softirq_qs+0x20/0x20 [ 348.480947] ? __fget+0x4d1/0x740 [ 348.484427] ? ksys_dup3+0x680/0x680 [ 348.488166] block_ioctl+0xee/0x130 [ 348.491788] ? blkdev_fallocate+0x400/0x400 [ 348.496100] do_vfs_ioctl+0x1de/0x1720 [ 348.499982] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 348.505514] ? ioctl_preallocate+0x300/0x300 [ 348.509917] ? __fget_light+0x2e9/0x430 [ 348.513890] ? fget_raw+0x20/0x20 [ 348.517347] ? rcu_read_lock_sched_held+0x14f/0x180 [ 348.522358] ? kmem_cache_free+0x24f/0x290 [ 348.526591] ? putname+0xf7/0x130 [ 348.530037] ? do_syscall_64+0x9a/0x820 [ 348.533999] ? do_syscall_64+0x9a/0x820 [ 348.537995] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 348.542591] ? security_file_ioctl+0x94/0xc0 [ 348.546992] ksys_ioctl+0xa9/0xd0 [ 348.550435] __x64_sys_ioctl+0x73/0xb0 [ 348.554323] do_syscall_64+0x1b9/0x820 [ 348.558214] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 348.563602] ? syscall_return_slowpath+0x5e0/0x5e0 [ 348.568597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.573435] ? trace_hardirqs_on_caller+0x310/0x310 [ 348.578441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 348.583447] ? prepare_exit_to_usermode+0x291/0x3b0 [ 348.588468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.593322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.598508] RIP: 0033:0x4573d7 [ 348.601705] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.620598] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.628300] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 348.635580] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 348.642861] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 348.650138] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 348.657409] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 348.677666] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:49:13 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) recvfrom$inet(r0, &(0x7f0000000180)=""/62, 0x3e, 0x10000, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "6f8179036b46a395fb413def41eec46c3ef8c050"}, 0x15, 0x3) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl(r1, 0x0, &(0x7f0000000080)="b4c1f64876aee38379e7e9627c22eebe0f53629580b2c0b23331b8361e2a840f428d23c60155e6d845cb5e6aec7488dbc71b6af15a0588a9ece8a7be5b85998a56da1827cf2e6c0eb8587d60bbcec4d810ec39285bb4a19db94119f4abac1783aadde1126f3e3430620646f39d800d998477671716d45653e164f7ab02d39b5f43b3efa6b3ed80642322c89815e8aebecb1035175538f7fae6dd2457657731b7a398ae6d182668ae00c1c175817ce6105e380f38836ec459fed22224d269e82ea1e1a0f1cb66d3d88f67844a8173d5bc8abfc4039356bfbed4d65104d3") ioctl(r0, 0xbc4, &(0x7f0000000240)="3e8f2d9237422802f36f4f7f0c08f873914b381ed0b14d8567901e3a49fc455a42afc46cd55c91d35557fde28236910829b56b64b52002d6ed01e1167ee7c008065b3bdca6a79a7f9d26ed5b6a959b368bc751a604d0f79b0a529700d5f99394b27c0416e10c4484c2ab74af25265c44f95b6f1f70834870bb7d974a8b6bf850d84ec76d22de27a7ff1d25167586e1862dbf50c5eb5fda898edade55fe669c3f70da26b72d7910320e76f73b64fc04d54305f32a319ab56b046a807cd940ff48") 17:49:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:13 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0xfefdffff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:13 executing program 1: umount2(&(0x7f0000000000)='./file0\x00', 0x8) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004dfe1f00200020002000200020002000200020002000200000000000000000bb000000000000bb252f450032e0b4bd1a00770000000000000000000000000000000000000000480ac40adbee4d16642ed4", 0x82, 0x9000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00bf8e3677e0347a88b31f03b4239f4e09f2c78f2442179e5704983335fcdf00a0b928b611ca919b5ddaa99c8fa36369bd8a1f2cc5534dd2b5c3afe94bd3e65526fe8af2558efaf9c39a88d0e6d4cbedf313c0e7cf396f9ff8d3751e0737402bcf673aafd5b3039d88594b626e24e333753b715ce2796c8b036542b6701c57a3fb65c5335e39286397a8285e22c004f039d3da459c780831157ed31d570afa814e3ea54ec7baf3f966db77da504b0041ee832f47b672d836f8d29313e57ade0bbc1fe2c6"]) [ 348.684758] kauditd_printk_skb: 13 callbacks suppressed [ 348.684775] audit: type=1804 audit(1539712153.755:406): pid=14077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/259/file0" dev="sda1" ino=16916 res=1 17:49:13 executing program 2 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:13 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0xffc99a3b}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 348.798357] audit: type=1804 audit(1539712153.755:407): pid=14077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/259/file0" dev="sda1" ino=16916 res=1 17:49:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 348.854672] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 348.872844] ISOFS: Bad logical zone size 54318 [ 348.877409] audit: type=1804 audit(1539712153.915:408): pid=14088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/260/file0" dev="sda1" ino=16907 res=1 17:49:13 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="be30bf6ea48e35f6db030000000000009100d236a99ade6db140c31dffe58b68bc008769296c37ca67b400800000000000000000007b68f2aba83f72ff"], 0x1) [ 348.912187] audit: type=1804 audit(1539712153.915:409): pid=14088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/260/file0" dev="sda1" ino=16907 res=1 [ 348.951140] FAULT_INJECTION: forcing a failure. [ 348.951140] name failslab, interval 1, probability 0, space 0, times 0 [ 348.963221] CPU: 0 PID: 14096 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 348.971739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.981106] Call Trace: [ 348.983716] dump_stack+0x244/0x39d [ 348.987358] ? dump_stack_print_info.cold.1+0x20/0x20 [ 348.992571] ? lo_ioctl+0xe6/0x1d60 [ 348.996224] should_fail.cold.4+0xa/0x17 [ 349.000299] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 349.005415] ? blkpg_ioctl+0xc10/0xc10 [ 349.009351] ? lock_downgrade+0x900/0x900 [ 349.013500] ? check_preemption_disabled+0x48/0x280 [ 349.018977] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 349.023914] ? kasan_check_read+0x11/0x20 [ 349.028071] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 349.033372] ? find_held_lock+0x36/0x1c0 [ 349.037465] ? perf_trace_sched_process_exec+0x860/0x860 [ 349.042927] ? block_ioctl+0xee/0x130 [ 349.046738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.052291] __should_failslab+0x124/0x180 [ 349.056538] should_failslab+0x9/0x14 [ 349.060359] kmem_cache_alloc+0x2be/0x730 [ 349.064516] ? fget_raw+0x20/0x20 [ 349.067980] getname_flags+0xd0/0x590 [ 349.071797] do_mkdirat+0xc5/0x310 [ 349.075351] ? __ia32_sys_mknod+0xb0/0xb0 [ 349.079503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.084886] ? trace_hardirqs_off_caller+0x300/0x300 [ 349.089998] ? ksys_ioctl+0x81/0xd0 [ 349.093637] __x64_sys_mkdir+0x5c/0x80 [ 349.097541] do_syscall_64+0x1b9/0x820 [ 349.101451] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 349.106831] ? syscall_return_slowpath+0x5e0/0x5e0 [ 349.111768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.116627] ? trace_hardirqs_on_caller+0x310/0x310 [ 349.121652] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 349.126677] ? prepare_exit_to_usermode+0x291/0x3b0 [ 349.131710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.136580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.141775] RIP: 0033:0x456987 [ 349.144978] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.163897] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 349.171616] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 349.178905] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 349.186185] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 349.193465] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 349.200745] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 17:49:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:14 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:14 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 349.216602] audit: type=1804 audit(1539712154.285:410): pid=14102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/261/file0" dev="sda1" ino=16929 res=1 [ 349.231609] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 349.254388] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:14 executing program 2 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) ioctl$KDDISABIO(r2, 0x4b37) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) recvmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000200)=@un=@abs, 0x80, &(0x7f0000000100)=[{&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000380)=""/107, 0x6b}], 0x3, &(0x7f0000000400)=""/198, 0xc6, 0x9}, 0x40010021) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) close(r1) [ 349.316479] audit: type=1804 audit(1539712154.295:411): pid=14103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/261/file0" dev="sda1" ino=16929 res=1 17:49:14 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 349.387905] audit: type=1804 audit(1539712154.435:412): pid=14112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/262/file0" dev="sda1" ino=16913 res=1 17:49:14 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 349.434479] audit: type=1804 audit(1539712154.435:413): pid=14113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/262/file0" dev="sda1" ino=16913 res=1 [ 349.490495] FAULT_INJECTION: forcing a failure. [ 349.490495] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 349.492835] audit: type=1804 audit(1539712154.565:414): pid=14123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/263/file0" dev="sda1" ino=16908 res=1 [ 349.502377] CPU: 0 PID: 14125 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 17:49:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:14 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 349.502388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.502394] Call Trace: [ 349.502423] dump_stack+0x244/0x39d [ 349.502447] ? dump_stack_print_info.cold.1+0x20/0x20 [ 349.502480] should_fail.cold.4+0xa/0x17 [ 349.502507] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 349.502527] ? kobject_uevent_env+0xf76/0x101e [ 349.569375] ? wait_for_completion+0x8a0/0x8a0 [ 349.573993] ? mark_held_locks+0x130/0x130 [ 349.574012] ? kobject_uevent_env+0x100d/0x101e [ 349.574041] ? mutex_unlock+0xd/0x10 [ 349.586667] ? lo_ioctl+0xe6/0x1d60 [ 349.590327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.595886] ? should_fail+0x22d/0xd01 [ 349.599790] ? blkdev_ioctl+0x15d/0x2010 [ 349.599813] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 349.599832] ? blkpg_ioctl+0xc10/0xc10 [ 349.612895] ? lock_downgrade+0x900/0x900 [ 349.617084] __alloc_pages_nodemask+0x34b/0xdd0 [ 349.621770] ? kasan_check_read+0x11/0x20 [ 349.625934] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 349.631240] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 349.636289] ? find_held_lock+0x36/0x1c0 [ 349.640392] ? trace_hardirqs_off+0xb8/0x310 [ 349.644827] cache_grow_begin+0xa5/0x8c0 [ 349.646256] audit: type=1804 audit(1539712154.605:415): pid=14127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/263/file0" dev="sda1" ino=16908 res=1 [ 349.648898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 349.648924] kmem_cache_alloc+0x66b/0x730 [ 349.648940] ? fget_raw+0x20/0x20 [ 349.648960] getname_flags+0xd0/0x590 17:49:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:14 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0xfefdffff00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 349.648978] do_mkdirat+0xc5/0x310 [ 349.648997] ? __ia32_sys_mknod+0xb0/0xb0 [ 349.649011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.649028] ? trace_hardirqs_off_caller+0x300/0x300 [ 349.649047] ? ksys_ioctl+0x81/0xd0 [ 349.711121] __x64_sys_mkdir+0x5c/0x80 [ 349.715025] do_syscall_64+0x1b9/0x820 [ 349.718932] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 349.724323] ? syscall_return_slowpath+0x5e0/0x5e0 [ 349.729266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.729287] ? trace_hardirqs_on_caller+0x310/0x310 [ 349.729304] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 349.729320] ? prepare_exit_to_usermode+0x291/0x3b0 [ 349.729346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.729369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.729390] RIP: 0033:0x456987 [ 349.729416] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.729430] RSP: 002b:00007f300fb39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 17:49:14 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 349.749310] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 349.749321] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 349.749329] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 349.749337] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 349.749345] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 349.830966] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:49:15 executing program 2 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 349.972505] FAULT_INJECTION: forcing a failure. [ 349.972505] name failslab, interval 1, probability 0, space 0, times 0 [ 349.984755] CPU: 0 PID: 14150 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 349.993277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.002643] Call Trace: [ 350.005281] dump_stack+0x244/0x39d [ 350.008937] ? dump_stack_print_info.cold.1+0x20/0x20 [ 350.014148] ? __handle_mm_fault+0xa57/0x5be0 [ 350.018675] should_fail.cold.4+0xa/0x17 [ 350.022762] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 350.027881] ? kasan_check_read+0x11/0x20 [ 350.032038] ? do_raw_spin_unlock+0xa7/0x330 [ 350.036464] ? trace_hardirqs_on+0x310/0x310 [ 350.040895] ? zap_class+0x640/0x640 [ 350.044627] ? zap_class+0x640/0x640 [ 350.048352] ? zap_class+0x640/0x640 [ 350.052086] ? find_held_lock+0x36/0x1c0 [ 350.056203] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 350.061165] ? perf_trace_sched_process_exec+0x860/0x860 [ 350.066633] ? rcu_softirq_qs+0x20/0x20 [ 350.070625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 350.076179] __should_failslab+0x124/0x180 [ 350.080455] should_failslab+0x9/0x14 [ 350.084290] __kmalloc_track_caller+0x2d1/0x760 [ 350.088991] ? strncpy_from_user+0x5a0/0x5a0 [ 350.093421] ? strndup_user+0x77/0xd0 [ 350.097239] memdup_user+0x2c/0xa0 [ 350.100795] strndup_user+0x77/0xd0 [ 350.104447] ksys_mount+0x3c/0x140 [ 350.108008] __x64_sys_mount+0xbe/0x150 [ 350.111999] do_syscall_64+0x1b9/0x820 [ 350.115900] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 350.121287] ? syscall_return_slowpath+0x5e0/0x5e0 [ 350.126230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.131089] ? trace_hardirqs_on_caller+0x310/0x310 [ 350.136124] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 350.141160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.146717] ? prepare_exit_to_usermode+0x291/0x3b0 [ 350.151757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.156629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.161828] RIP: 0033:0x459fda [ 350.165039] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 350.183963] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 350.191697] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 350.198982] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 350.206267] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 350.213548] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 17:49:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:15 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000640)={{0x1, 0x7, 0x4, 0x2, '\x00', 0x8}, 0x1, [0x1ff, 0x100000001, 0x9, 0x6f8, 0x2, 0x9, 0x75, 0x8b8, 0x3, 0x1ff, 0x0, 0xf809, 0x1f, 0x4c4, 0xab, 0x0, 0x2, 0x8, 0x6, 0x7ff, 0xfce2, 0x8dc, 0x9, 0x5, 0x8, 0x10001, 0x3, 0x800, 0x7fff, 0xb1, 0x1, 0x8, 0xec18, 0xc7, 0xfffffffffffffffc, 0xad0e, 0x10001, 0xfcf, 0x4cb4e439, 0x0, 0x0, 0x5, 0x17, 0xff, 0x2, 0x2, 0x0, 0x0, 0x7fff, 0x4, 0x401, 0x5, 0x7, 0x7a, 0x101, 0x553a, 0x80000000, 0x1, 0x2571, 0x4, 0x1, 0xb1f, 0x8, 0x8, 0x6, 0x0, 0x3f, 0x4, 0xab, 0x10001, 0x1000, 0x4, 0xfffffffffffffff7, 0xfffffffffffffff7, 0x2, 0xffffffffffffffff, 0x2, 0x7fff, 0x40, 0x800, 0x401, 0x10001, 0x3, 0xbe6, 0x4, 0x1000, 0x5, 0xde40, 0x9, 0x100000000, 0x8001, 0x1a5, 0x71f, 0xffffffffffffe4ee, 0x0, 0xa13, 0x8c40, 0x0, 0x7, 0x2, 0x2, 0xa88, 0xffffffff, 0x10001, 0x8001, 0x2bdf, 0x371, 0x9, 0x9, 0x3, 0x3, 0x100000001, 0x9, 0x20, 0xb2, 0x7, 0x1, 0x7, 0x9, 0xfffffffffffffffe, 0x100, 0xffffffff, 0x81, 0xa8, 0x0, 0x4, 0x9, 0x3ff], {0x77359400}}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000600)={0x0, @remote, @multicast1}, &(0x7f0000001d00)=0xc) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@local, @in6=@mcast1, 0x4e21, 0xff, 0x4e20, 0x0, 0xa, 0x0, 0x20, 0x3f, r1, r2}, {0x7, 0x2d9, 0x5, 0x400, 0xffffffffffffffff, 0xc1bd, 0xfe, 0x8}, {0x4, 0x2, 0xffffffff, 0x2}, 0x80000000, 0x6e6bb4, 0x0, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d3, 0x6c}, 0x2, @in=@multicast2, 0x3501, 0x0, 0x2, 0x0, 0xed5d, 0x3, 0xfffffffffffffff9}}, 0xe8) fchdir(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001b40)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000005c0)=0xe8) r4 = getuid() syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x1, 0x3, &(0x7f0000000540)=[{&(0x7f0000000b40)="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", 0x1000, 0xffff}, {&(0x7f0000000340)="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", 0xfb, 0x10001}, {&(0x7f0000000440)="0a1ef3130069283335d50568d53ce752ba91c0339f0ddbb7758854564db9f3e2782ac2bffcb81281c594e9770236e8bd2610c87b234848d545d8c83a8a22815b64ac5286e06e9a77d9e2c07d39d5de14817f8155088d530e12843b5dd888c762250574eb4d1c953f26aede67740136d493c01c6da8e5ab1429908a6f6b1de9796cd4dfd8441030f34b22afb72a584abaeaf33484a3596ffb6f140e6dc177db28f228b49b70a24c7529369b05ae7dc24d1fdfab5f7d85c6d88413415183bb8497f13ab67336abd739c2326f2dba325ee619ad0d682000f155e1bd792ca193a237162be67fe51b1246e8f72564396b", 0xee, 0x2}], 0x20000, &(0x7f0000001c40)={[{@dmask={'dmask', 0x3d, 0x18}}, {@utf8='utf8'}, {@case_sensitive_no='case_sensitive=no'}, {@utf8='utf8'}, {@case_sensitive_no='case_sensitive=no'}, {@uid={'uid', 0x3d, r3}}, {@case_sensitive_yes='case_sensitive=yes'}], [{@uid_eq={'uid', 0x3d, r4}}]}) r5 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x8) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x108, r6, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0xffffffffffffffff) 17:49:15 executing program 1: socketpair$unix(0x1, 0x100000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r1, &(0x7f0000004380)=""/4096, 0x1000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000080)) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x7) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0x107000, 0x2004, 0x16000000000000, 0x6, 0x1}) getdents64(r1, &(0x7f0000000140)=""/85, 0x55) 17:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:15 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0xffc99a3b}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 350.220844] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 17:49:15 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0xfefdffff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:15 executing program 2 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:15 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e23, 0xe3, @dev={0xfe, 0x80, [], 0x19}, 0x7}, {0xa, 0x4e20, 0x62c, @loopback, 0x2}, 0x9, [0x2, 0x5, 0x1, 0x6, 0x8, 0x6, 0x6, 0xfff]}, 0x5c) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000080)) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:15 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 350.469152] FAULT_INJECTION: forcing a failure. [ 350.469152] name failslab, interval 1, probability 0, space 0, times 0 [ 350.500214] CPU: 1 PID: 14177 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 350.508779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.518150] Call Trace: [ 350.520769] dump_stack+0x244/0x39d [ 350.524421] ? dump_stack_print_info.cold.1+0x20/0x20 [ 350.524444] ? __handle_mm_fault+0xa57/0x5be0 [ 350.524478] should_fail.cold.4+0xa/0x17 [ 350.534164] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 350.534182] ? kasan_check_read+0x11/0x20 [ 350.534197] ? do_raw_spin_unlock+0xa7/0x330 [ 350.534217] ? trace_hardirqs_on+0x310/0x310 [ 350.556320] ? zap_class+0x640/0x640 [ 350.560057] ? zap_class+0x640/0x640 [ 350.563793] ? zap_class+0x640/0x640 [ 350.568025] ? find_held_lock+0x36/0x1c0 [ 350.572131] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 350.577082] ? perf_trace_sched_process_exec+0x860/0x860 [ 350.582550] ? rcu_softirq_qs+0x20/0x20 [ 350.586552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 350.592116] __should_failslab+0x124/0x180 [ 350.596372] should_failslab+0x9/0x14 [ 350.600185] __kmalloc_track_caller+0x2d1/0x760 [ 350.604871] ? strncpy_from_user+0x5a0/0x5a0 [ 350.609293] ? strndup_user+0x77/0xd0 [ 350.613117] memdup_user+0x2c/0xa0 [ 350.616675] strndup_user+0x77/0xd0 [ 350.620322] ksys_mount+0x3c/0x140 [ 350.623897] __x64_sys_mount+0xbe/0x150 [ 350.627891] do_syscall_64+0x1b9/0x820 [ 350.631788] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 350.637169] ? syscall_return_slowpath+0x5e0/0x5e0 [ 350.642126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.646984] ? trace_hardirqs_on_caller+0x310/0x310 [ 350.652017] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 350.657045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.662600] ? prepare_exit_to_usermode+0x291/0x3b0 [ 350.667636] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.672500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.677700] RIP: 0033:0x459fda [ 350.680905] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 350.699816] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 350.707538] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda 17:49:15 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0x2, 0x4) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00980a8cca9fa881d6ff82591b35738350124d"], 0x1) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) 17:49:15 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 350.714823] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 350.722103] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 350.729382] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 350.736657] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 17:49:16 executing program 1: r0 = getgid() syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000340)=[{&(0x7f00000000c0)="0f8b4c33e355100e73ecabe2c601a81693d575b564638e172d81dae645fe8e8eeb68d46e0c5d883992564185682d40058d7f2b109b924fc91e26de0a676f3a8d22030cc6139fd951f010b3a5195338b911b53210472cbb0a052ccce96798a2b74ec301eebba9f73b499f8452c8d0f325d10407cc53c72fedfa31b4fb3e71e31398d9094fb8b8d19d0909148e916e6f0400417af1eb31e7e0750d51b15ce2454b277452c1fb48c0b5480c413f1e011b0aa90f0e494218831b", 0xb8, 0x8000}, {&(0x7f00000001c0)="2150c4690f19ee094fd45462acfff3614bc1d33a8db8a45d3d449fff5644759d0a7c31ab99f8d65f634ad856c69cfa3f6e54329d67cd8c", 0x37, 0xfffffffeffffffff}, {&(0x7f0000000200)="6d518864223c2147ac94460c321757085ec151eb8d51394354e5929cb5", 0x1d, 0x1}, {&(0x7f0000000240)="88724aa2bc4c422777fb19efce17257c7adfdd8ebb07b9c76769692528546ebf5353ba57f9b94f03e742bf3881e0e36baad3d23f4e58f3e10e2cb27890aaea9778bc4bf4affb301e0a7aee47959401a124d54706be6718949db3aeb59f0209c3914ae85c5b471c1095a39915d9e0dbac32756ca4bd9c0f98dfb70a4e1c6a0868ecf69f42bde08656a4afcd9cb12144b875007bb321e6dae57d251f20093b767bb97acb0a5383353f761f43acad787d4a24759f30be542460cc6faef3dc57261e743aeb759ddccb70a00eeeaedf671374f90a", 0xd2, 0x7}], 0x2, &(0x7f00000003c0)={[{@decompose='decompose'}, {@type={'type', 0x3d, "597ebec9"}}, {@nls={'nls', 0x3d, 'default'}}, {@gid={'gid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x2}}, {@force='force'}], [{@hash='hash'}]}) r1 = socket$inet(0x10, 0x80002, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a60080000000000000001180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b0798910000000000000000000000", 0x4c}], 0x1}, 0x0) 17:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:16 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x1411c0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x9, 0xffff}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB=' '], 0x1) 17:49:16 executing program 2 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:16 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:16 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 351.180089] FAULT_INJECTION: forcing a failure. [ 351.180089] name failslab, interval 1, probability 0, space 0, times 0 [ 351.216597] CPU: 1 PID: 14205 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 351.225149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.225158] Call Trace: [ 351.225185] dump_stack+0x244/0x39d [ 351.225227] ? dump_stack_print_info.cold.1+0x20/0x20 [ 351.240826] ? __kernel_text_address+0xd/0x40 [ 351.240844] ? unwind_get_return_address+0x61/0xa0 [ 351.240875] should_fail.cold.4+0xa/0x17 [ 351.250581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 351.250608] ? kasan_kmalloc+0xc7/0xe0 [ 351.250623] ? __kmalloc_track_caller+0x157/0x760 [ 351.250639] ? memdup_user+0x2c/0xa0 [ 351.250654] ? zap_class+0x640/0x640 [ 351.250670] ? do_syscall_64+0x1b9/0x820 [ 351.250689] ? zap_class+0x640/0x640 [ 351.264767] ? zap_class+0x640/0x640 [ 351.264792] ? find_held_lock+0x36/0x1c0 [ 351.264829] ? perf_trace_sched_process_exec+0x860/0x860 [ 351.301915] ? lock_release+0xa10/0xa10 [ 351.305911] ? perf_trace_sched_process_exec+0x860/0x860 [ 351.311381] ? usercopy_warn+0x110/0x110 [ 351.315496] __should_failslab+0x124/0x180 [ 351.319759] should_failslab+0x9/0x14 [ 351.323590] kmem_cache_alloc_trace+0x2d7/0x750 [ 351.328285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.333839] ? _copy_from_user+0xdf/0x150 [ 351.338017] copy_mount_options+0x5f/0x430 [ 351.342268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.347829] ksys_mount+0xd0/0x140 [ 351.351404] __x64_sys_mount+0xbe/0x150 [ 351.355403] do_syscall_64+0x1b9/0x820 [ 351.359307] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 351.364690] ? syscall_return_slowpath+0x5e0/0x5e0 [ 351.369638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.374501] ? trace_hardirqs_on_caller+0x310/0x310 [ 351.379540] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 351.384594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.390153] ? prepare_exit_to_usermode+0x291/0x3b0 [ 351.395192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.400073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.405275] RIP: 0033:0x459fda [ 351.408484] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 17:49:16 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff"], 0x1) 17:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 351.427402] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 351.435134] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 351.442425] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 351.449714] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 351.456997] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 351.464285] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 351.500870] hfsplus: unable to parse mount options 17:49:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="657874327f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:16 executing program 2 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x30200, 0x0) keyctl$reject(0x13, r0, 0xffffffff, 0x201, r0) r1 = socket(0x10, 0x3, 0xa) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x20000) request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280), &(0x7f00000002c0)='*wlan1*trustedeth0\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)="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") sendfile(r1, r2, &(0x7f0000000040)=0x100500, 0x100000001) 17:49:16 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:16 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101080, 0x0) getsockname(r1, &(0x7f0000000080)=@ethernet={0x0, @dev}, &(0x7f0000000100)=0xa9) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000140)={0x3, 0x0, 0x3, 0x4}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000180)={0x10000, r2, 0x1, 0x81}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000342cc95a"], 0x1) 17:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:16 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3c, 0x0, 0x70bd25, 0x25dfdbfe, {0x1}, [@typed={0x14, 0x63, @ipv6}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000080) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) timerfd_create(0x0, 0x80000) 17:49:16 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:17 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:17 executing program 4: r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='bdevsecurity:(security%trusted\x00', 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)='\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 351.997285] FAULT_INJECTION: forcing a failure. [ 351.997285] name failslab, interval 1, probability 0, space 0, times 0 [ 352.009519] CPU: 0 PID: 14250 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 352.018049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.027423] Call Trace: [ 352.030041] dump_stack+0x244/0x39d [ 352.033694] ? dump_stack_print_info.cold.1+0x20/0x20 [ 352.038900] ? __kernel_text_address+0xd/0x40 [ 352.043409] ? unwind_get_return_address+0x61/0xa0 [ 352.048363] should_fail.cold.4+0xa/0x17 [ 352.052491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.057626] ? kasan_kmalloc+0xc7/0xe0 [ 352.061529] ? __kmalloc_track_caller+0x157/0x760 [ 352.066419] ? memdup_user+0x2c/0xa0 [ 352.070154] ? zap_class+0x640/0x640 [ 352.073879] ? do_syscall_64+0x1b9/0x820 [ 352.077956] ? zap_class+0x640/0x640 [ 352.081683] ? zap_class+0x640/0x640 [ 352.085419] ? find_held_lock+0x36/0x1c0 [ 352.089515] ? perf_trace_sched_process_exec+0x860/0x860 [ 352.094979] ? lock_release+0xa10/0xa10 [ 352.094995] ? perf_trace_sched_process_exec+0x860/0x860 [ 352.095014] ? usercopy_warn+0x110/0x110 [ 352.095036] __should_failslab+0x124/0x180 [ 352.112772] should_failslab+0x9/0x14 [ 352.116604] kmem_cache_alloc_trace+0x2d7/0x750 [ 352.121298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.126855] ? _copy_from_user+0xdf/0x150 [ 352.131028] copy_mount_options+0x5f/0x430 [ 352.135271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.140824] ksys_mount+0xd0/0x140 [ 352.140848] __x64_sys_mount+0xbe/0x150 [ 352.140871] do_syscall_64+0x1b9/0x820 [ 352.140887] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 352.140907] ? syscall_return_slowpath+0x5e0/0x5e0 [ 352.157668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.157691] ? trace_hardirqs_on_caller+0x310/0x310 [ 352.157709] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 352.157725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.157741] ? prepare_exit_to_usermode+0x291/0x3b0 [ 352.157762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.157786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.157799] RIP: 0033:0x459fda [ 352.157817] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 352.172602] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 352.172618] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 352.172628] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 17:49:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x48) [ 352.172639] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 352.172647] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 352.172662] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 352.349527] EXT4-fs: 9 callbacks suppressed [ 352.349540] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:17 executing program 2 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:17 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:17 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000002c0)='./file0\x00', 0xc000, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) 17:49:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20000160) 17:49:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x30200, 0x0) keyctl$reject(0x13, r0, 0xffffffff, 0x201, r0) r1 = socket(0x10, 0x3, 0xa) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x20000) request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280), &(0x7f00000002c0)='*wlan1*trustedeth0\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)="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") sendfile(r1, r2, &(0x7f0000000040)=0x100500, 0x100000001) 17:49:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:17 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="56cad07c3f02219e9612600ffc11603678482504ed3218585d0b9a81184e1d95d7e2d29c6d2e8a641f2f77c263c01fb2f14028fa214cff2a489a6e660bbb9124914dc9190c07ac1eb63b1911a11515e699073c266a904b2e80d46d4f546e513e7cda02696ae2cfcd412d99e4"], 0x1) 17:49:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x25) 17:49:17 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 352.727440] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 352.799341] FAULT_INJECTION: forcing a failure. [ 352.799341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 352.811205] CPU: 1 PID: 14282 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 352.819702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.819710] Call Trace: [ 352.819737] dump_stack+0x244/0x39d [ 352.819764] ? dump_stack_print_info.cold.1+0x20/0x20 [ 352.840492] ? find_get_entries_tag+0x1400/0x1400 [ 352.845344] ? print_usage_bug+0xc0/0xc0 [ 352.845360] ? print_usage_bug+0xc0/0xc0 [ 352.845384] should_fail.cold.4+0xa/0x17 [ 352.857555] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.862700] ? mark_held_locks+0x130/0x130 [ 352.866945] ? zap_class+0x640/0x640 [ 352.870674] ? zap_class+0x640/0x640 [ 352.874402] ? print_usage_bug+0xc0/0xc0 [ 352.878480] ? is_bpf_text_address+0xac/0x170 [ 352.882999] ? find_held_lock+0x36/0x1c0 [ 352.887086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.892637] ? should_fail+0x22d/0xd01 [ 352.896545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.901681] __alloc_pages_nodemask+0x34b/0xdd0 [ 352.906363] ? rcu_softirq_qs+0x20/0x20 [ 352.910359] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 352.915397] ? find_held_lock+0x36/0x1c0 [ 352.919499] ? trace_hardirqs_off+0xb8/0x310 [ 352.923933] cache_grow_begin+0xa5/0x8c0 [ 352.928008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.933620] kmem_cache_alloc+0x66b/0x730 [ 352.937791] ? find_held_lock+0x36/0x1c0 [ 352.941875] getname_flags+0xd0/0x590 [ 352.945694] user_path_at_empty+0x2d/0x50 [ 352.949861] do_mount+0x180/0x1d90 [ 352.953417] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 352.959056] ? rcu_pm_notify+0xc0/0xc0 [ 352.962966] ? copy_mount_string+0x40/0x40 [ 352.967221] ? copy_mount_options+0x5f/0x430 [ 352.971646] ? rcu_read_lock_sched_held+0x14f/0x180 [ 352.976674] ? kmem_cache_alloc_trace+0x353/0x750 [ 352.981534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.987099] ? _copy_from_user+0xdf/0x150 [ 352.991264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.996810] ? copy_mount_options+0x315/0x430 [ 353.001322] ksys_mount+0x12d/0x140 [ 353.004967] __x64_sys_mount+0xbe/0x150 [ 353.008963] do_syscall_64+0x1b9/0x820 [ 353.012863] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 353.018283] ? syscall_return_slowpath+0x5e0/0x5e0 [ 353.023225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.028090] ? trace_hardirqs_on_caller+0x310/0x310 [ 353.033119] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 353.038151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.043699] ? prepare_exit_to_usermode+0x291/0x3b0 [ 353.048738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.053601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.058823] RIP: 0033:0x459fda [ 353.062024] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 353.080956] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 353.088670] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda 17:49:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x30200, 0x0) keyctl$reject(0x13, r0, 0xffffffff, 0x201, r0) r1 = socket(0x10, 0x3, 0xa) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x20000) request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280), &(0x7f00000002c0)='*wlan1*trustedeth0\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)="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") sendfile(r1, r2, &(0x7f0000000040)=0x100500, 0x100000001) [ 353.095944] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 353.103216] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 353.110491] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 353.117767] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 17:49:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2L', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) [ 353.143701] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, 17:49:18 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:18 executing program 2 (fault-call:2 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:18 executing program 5: socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$getname(0x10, &(0x7f00000001c0)=""/4096) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:18 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000000)={0x2, 0x0, [0x20, 0x9, 0x4, 0x8, 0x9, 0x6, 0x7, 0x100000001]}) 17:49:18 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f35fdbbf0a2bd9f298b50fa5f26762a7f7db4703809c9eb0100220000000000000000399e59afacca30f2a688"], &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:18 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x200000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000640)=""/4096) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x20) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="f50000000000a700e99e568cae444fc70d09e67c128a335f600ca2ac00000000000000000002c6607ee8f70000000000"], 0x1) 17:49:18 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 353.418354] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 353.504971] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 353.524638] FAULT_INJECTION: forcing a failure. [ 353.524638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.536513] CPU: 1 PID: 14320 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 353.545019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.554387] Call Trace: [ 353.557000] dump_stack+0x244/0x39d [ 353.560673] ? dump_stack_print_info.cold.1+0x20/0x20 [ 353.565888] ? find_get_entries_tag+0x1400/0x1400 [ 353.570748] ? print_usage_bug+0xc0/0xc0 [ 353.570765] ? print_usage_bug+0xc0/0xc0 [ 353.570791] should_fail.cold.4+0xa/0x17 [ 353.570813] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 353.583015] ? mark_held_locks+0x130/0x130 [ 353.583034] ? zap_class+0x640/0x640 [ 353.596087] ? zap_class+0x640/0x640 [ 353.599813] ? print_usage_bug+0xc0/0xc0 [ 353.603880] ? is_bpf_text_address+0xac/0x170 [ 353.608396] ? find_held_lock+0x36/0x1c0 [ 353.612472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.618016] ? should_fail+0x22d/0xd01 [ 353.621917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 353.627035] __alloc_pages_nodemask+0x34b/0xdd0 [ 353.631716] ? rcu_softirq_qs+0x20/0x20 [ 353.635705] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 353.640736] ? find_held_lock+0x36/0x1c0 [ 353.644835] ? trace_hardirqs_off+0xb8/0x310 [ 353.649254] cache_grow_begin+0xa5/0x8c0 [ 353.653327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 353.658882] kmem_cache_alloc+0x66b/0x730 [ 353.663049] getname_flags+0xd0/0x590 [ 353.666863] user_path_at_empty+0x2d/0x50 [ 353.671025] do_mount+0x180/0x1d90 [ 353.674583] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 353.680138] ? rcu_pm_notify+0xc0/0xc0 [ 353.684038] ? copy_mount_string+0x40/0x40 [ 353.688293] ? copy_mount_options+0x5f/0x430 [ 353.692712] ? rcu_read_lock_sched_held+0x14f/0x180 [ 353.697745] ? kmem_cache_alloc_trace+0x353/0x750 [ 353.702610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 353.708166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.713716] ? copy_mount_options+0x315/0x430 [ 353.718232] ksys_mount+0x12d/0x140 [ 353.721875] __x64_sys_mount+0xbe/0x150 [ 353.725860] do_syscall_64+0x1b9/0x820 [ 353.729756] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 353.735135] ? syscall_return_slowpath+0x5e0/0x5e0 [ 353.740076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.744930] ? trace_hardirqs_on_caller+0x310/0x310 [ 353.749957] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 353.754983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.760530] ? prepare_exit_to_usermode+0x291/0x3b0 [ 353.765585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.770444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.775640] RIP: 0033:0x459fda [ 353.778839] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 353.797749] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:49:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:18 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = gettid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000380)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000003c0)=0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000640)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r10 = fcntl$getown(r0, 0x9) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() r13 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="96621adad0ca2a56359cb223789c7cbb0939f27955d1b48a8ef1723e13ca34f00a0d6e771e42f9a68b1675e0a8746c45887295fe580f61ba45c4e3208f9298202298e9e8148fe910f357f69c434f02ec69e51be2c6aa0be2ffda6a65e506d2a13447f3c838a530ffeaf59ca5aa364872773df9ccc1db588dc32267c716385c9a65bea74f9f12f38dce7dc5772782798bb08e06c0572020016ec00c7211609c46938402d75ef23f1da40068f9281d3eb0e4c73536c4e13dde460465f2600aee2ac9ddb34874f61e66", 0xc8}, {&(0x7f0000000180)="b333ce5bf74b68c504ca7dea0663fc126c5decd8b101c5a0dd764311f1c47e0d667e2bdd428ddb6738fd5f1ebdf69f242bdc49d8a3ab63", 0x37}], 0x2, &(0x7f0000000980)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x148, 0x44000}, 0x10) truncate(&(0x7f0000000300)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r16 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r16, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) [ 353.805470] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 353.812747] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 353.820111] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 353.827388] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 353.834663] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 17:49:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x30200, 0x0) keyctl$reject(0x13, r0, 0xffffffff, 0x201, r0) r1 = socket(0x10, 0x3, 0xa) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x20000) request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280), &(0x7f00000002c0)='*wlan1*trustedeth0\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)="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") sendfile(r1, r2, &(0x7f0000000040)=0x100500, 0x100000001) 17:49:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="65787432f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:19 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 353.852768] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 353.875152] kauditd_printk_skb: 14 callbacks suppressed [ 353.875168] audit: type=1804 audit(1539712158.945:430): pid=14323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/276/file0" dev="sda1" ino=16923 res=1 17:49:19 executing program 2 (fault-call:2 fault-nth:31): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:19 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000140)={0x0, 0x4, 0x4, 0x4, 0xfffffffffffffffa}) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="01e36922729b122e740bbd3f235413533253805dcf9e770432c4150865fda0705acff7a890383cc7fbdac3dfde34cf82da8804fcebe655c348f8f0d9c531ae88efeca3574b498f1f39e9e35c332503fb2f2f9a476d20afb3cb34ac066c47319abbe50925dafd1aebb8fb87a20b0a032cc3bc2151e5d94a354fa4570864726ce2d0589576dd0302067ab2d8ce37b5b504785656a89a9974b8b1e7b7b1e3c5b68126bc675f4542afc548528a4e7c651e38bcaff499dd73727293f45dc8c2495ef6c11689ccac1b5b5d85f976727b481f166850e67ddf7faa29eede01a133098f7f1c6ba165620f3f1e769c99c30b43f0d3b12ca1610199e99ca32532e05b6ff53535aa5e2ce1ba29f05be28753c203bf415c618f4012966d33da7ed338da896917629bade5"], 0x1) 17:49:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x8, 0x101, 0xff, 0x1b, 0x1}, 0xfffffffffffffecc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:19 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 353.975744] audit: type=1804 audit(1539712158.985:431): pid=14323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/276/file0" dev="sda1" ino=16923 res=1 17:49:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x200, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0x104, 0x0, {"0af45019d639050c35bde3081b3924fae53ce430528784f283ca3128d296f4463d703d3d6e7de0132d4f606bdf055fc8d4961b9767198709852286cb801ac200ee4ce713da6424f293cfe6974d1c3e1f086450e796afd0e02493f7f1864f63fe315ae66509fd15e834493d000a9fdada9699fc3763c76e4d9dd7ef88d8f5efe52978e016aad6ba5f68ca73c473eac0df1523be3d52d0bd90bd53e495191e90cf6defc575399543419bff2031c1675e089962c19f032bd2ed077b197f3ffb002ab463820784cbe12cf9696bbf9ca9b2983def3f7e1d03fcce28e181baf1b8fc442ff113f12c1ad747b4"}}}, &(0x7f0000000040)=""/174, 0x106, 0xae, 0xfffffffffffffffd}, 0x20) [ 354.077602] audit: type=1804 audit(1539712159.155:432): pid=14338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/277/file0" dev="sda1" ino=16968 res=1 17:49:19 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:19 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x1117fe, 0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000080)=0x8) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x30200, 0x0) keyctl$reject(0x13, r0, 0xffffffff, 0x201, r0) r1 = socket(0x10, 0x3, 0xa) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x20000) request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280), &(0x7f00000002c0)='*wlan1*trustedeth0\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)="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") sendfile(r1, r2, &(0x7f0000000040)=0x100500, 0x100000001) [ 354.171093] audit: type=1804 audit(1539712159.175:433): pid=14338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/277/file0" dev="sda1" ino=16968 res=1 [ 354.172505] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 354.205241] FAULT_INJECTION: forcing a failure. [ 354.205241] name failslab, interval 1, probability 0, space 0, times 0 [ 354.257420] CPU: 0 PID: 14347 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 354.265973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.275344] Call Trace: [ 354.277957] dump_stack+0x244/0x39d [ 354.281618] ? dump_stack_print_info.cold.1+0x20/0x20 [ 354.286828] ? __kernel_text_address+0xd/0x40 [ 354.291339] ? unwind_get_return_address+0x61/0xa0 [ 354.296295] should_fail.cold.4+0xa/0x17 [ 354.300376] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.305501] ? kasan_kmalloc+0xc7/0xe0 [ 354.309398] ? __kmalloc_track_caller+0x157/0x760 [ 354.314254] ? memdup_user+0x2c/0xa0 [ 354.317999] ? zap_class+0x640/0x640 [ 354.321730] ? do_syscall_64+0x1b9/0x820 [ 354.325806] ? zap_class+0x640/0x640 [ 354.329744] ? zap_class+0x640/0x640 [ 354.333476] ? find_held_lock+0x36/0x1c0 [ 354.333523] ? perf_trace_sched_process_exec+0x860/0x860 [ 354.343060] ? lock_release+0xa10/0xa10 [ 354.343076] ? perf_trace_sched_process_exec+0x860/0x860 [ 354.343095] ? usercopy_warn+0x110/0x110 [ 354.343118] __should_failslab+0x124/0x180 [ 354.360855] should_failslab+0x9/0x14 [ 354.364673] kmem_cache_alloc_trace+0x2d7/0x750 [ 354.369362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.374914] ? _copy_from_user+0xdf/0x150 [ 354.379084] copy_mount_options+0x5f/0x430 [ 354.383337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.388896] ksys_mount+0xd0/0x140 [ 354.392457] __x64_sys_mount+0xbe/0x150 [ 354.396455] do_syscall_64+0x1b9/0x820 [ 354.400358] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 17:49:19 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 354.405735] ? syscall_return_slowpath+0x5e0/0x5e0 [ 354.410761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.415619] ? trace_hardirqs_on_caller+0x310/0x310 [ 354.420650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 354.425679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.431231] ? prepare_exit_to_usermode+0x291/0x3b0 [ 354.436783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.441647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.446843] RIP: 0033:0x459fda [ 354.450051] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 354.468977] RSP: 002b:00007f300fb18a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 354.476712] RAX: ffffffffffffffda RBX: 00007f300fb18b30 RCX: 0000000000459fda [ 354.483989] RDX: 00007f300fb18ad0 RSI: 0000000020000080 RDI: 00007f300fb18af0 [ 354.491271] RBP: 0000000020000080 R08: 00007f300fb18b30 R09: 00007f300fb18ad0 [ 354.498553] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 17:49:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) flistxattr(r0, &(0x7f0000000000)=""/14, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0xa00) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f00000001c0)) [ 354.505850] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 354.530688] audit: type=1804 audit(1539712159.535:434): pid=14354 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/278/file0" dev="sda1" ino=16975 res=1 [ 354.565255] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue 17:49:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:19 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) munlockall() write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) 17:49:19 executing program 2 (fault-call:2 fault-nth:32): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:19 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:19 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000100)=0x162) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)="657874327f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:19 executing program 4: open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="aa4fa700"], 0x1) [ 354.763360] audit: type=1804 audit(1539712159.835:435): pid=14366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/279/file0" dev="sda1" ino=16923 res=1 [ 354.793575] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 354.820890] audit: type=1804 audit(1539712159.835:436): pid=14371 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/279/file0" dev="sda1" ino=16923 res=1 [ 354.846066] FAULT_INJECTION: forcing a failure. [ 354.846066] name failslab, interval 1, probability 0, space 0, times 0 [ 354.859158] CPU: 1 PID: 14378 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 354.867674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.877035] Call Trace: [ 354.879662] dump_stack+0x244/0x39d [ 354.879689] ? dump_stack_print_info.cold.1+0x20/0x20 [ 354.879713] ? __save_stack_trace+0x8d/0xf0 [ 354.888530] should_fail.cold.4+0xa/0x17 [ 354.888555] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.888583] ? save_stack+0xa9/0xd0 [ 354.888601] ? save_stack+0x43/0xd0 [ 354.888615] ? kasan_kmalloc+0xc7/0xe0 [ 354.888635] ? kmem_cache_alloc_trace+0x152/0x750 [ 354.897015] ? do_mount+0xb70/0x1d90 [ 354.905724] ? ksys_mount+0x12d/0x140 [ 354.905741] ? __x64_sys_mount+0xbe/0x150 [ 354.905757] ? do_syscall_64+0x1b9/0x820 [ 354.905773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.905793] ? ksys_mount+0x12d/0x140 [ 354.913289] ? do_syscall_64+0x1b9/0x820 [ 354.913319] ? find_held_lock+0x36/0x1c0 [ 354.913364] ? perf_trace_sched_process_exec+0x860/0x860 [ 354.921912] __should_failslab+0x124/0x180 [ 354.921935] should_failslab+0x9/0x14 [ 354.921952] __kmalloc_track_caller+0x2d1/0x760 [ 354.921976] ? apparmor_fs_context_alloc+0x7e/0xa0 [ 354.929904] ? legacy_parse_monolithic+0xde/0x1e0 [ 354.929928] kmemdup+0x24/0x50 [ 354.929949] legacy_parse_monolithic+0xde/0x1e0 [ 354.929968] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 354.929986] do_mount+0xbd9/0x1d90 [ 354.930009] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 355.000848] ? copy_mount_string+0x40/0x40 [ 355.005112] ? copy_mount_options+0x5f/0x430 [ 355.009536] ? kmem_cache_alloc_trace+0x353/0x750 [ 355.014403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.019952] ? _copy_from_user+0xdf/0x150 [ 355.024119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.029671] ? copy_mount_options+0x315/0x430 [ 355.034188] ksys_mount+0x12d/0x140 [ 355.037832] __x64_sys_mount+0xbe/0x150 [ 355.041832] do_syscall_64+0x1b9/0x820 [ 355.045728] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 355.051111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 355.056053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.060957] ? trace_hardirqs_on_caller+0x310/0x310 [ 355.065988] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 355.071022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.076584] ? prepare_exit_to_usermode+0x291/0x3b0 [ 355.081622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.086488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.091685] RIP: 0033:0x459fda [ 355.094892] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 355.113805] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:49:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socket$key(0xf, 0x3, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000001, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x410000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xc36) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="04eb000100020000340af7cb6700000000000000593a7b8b2e"], &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 17:49:20 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) [ 355.121523] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 355.128813] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 355.136094] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 355.143375] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 355.150650] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 355.180128] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,,errors=continue [ 355.202295] audit: type=1804 audit(1539712160.275:437): pid=14386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/280/file0" dev="sda1" ino=16984 res=1 17:49:20 executing program 1: r0 = semget(0x2, 0x3, 0x301) semctl$GETVAL(r0, 0x0, 0xc, &(0x7f0000000040)=""/95) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000440)="48000000140019b469a81014aed182f30a84470080ffe0060000005770ee2abf8ee873115cfe764ed2544345abcc5d62ec0000050000005603ca0016087f89000000200006000101", 0x48}], 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000004c0)={0x0, 0x0, 0x2080}) 17:49:20 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:20 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) fgetxattr(r0, &(0x7f0000000000)=@known='trusted.syz\x00', &(0x7f0000000040)=""/132, 0x84) [ 355.230738] audit: type=1804 audit(1539712160.305:438): pid=14388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/280/file0" dev="sda1" ino=16984 res=1 17:49:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000340)={[{@barrier_val={'barrier'}}]}) 17:49:20 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:20 executing program 2 (fault-call:2 fault-nth:33): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 17:49:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0)=0x3, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) [ 355.353193] QAT: Invalid ioctl [ 355.357834] audit: type=1804 audit(1539712160.435:439): pid=14395 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir080413073/syzkaller.FCluec/281/file0" dev="sda1" ino=16978 res=1 [ 355.392749] QAT: Invalid ioctl 17:49:20 executing program 3: pselect6(0x3a, &(0x7f00000000c0), 0x0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f00000034c0), &(0x7f0000003540)={&(0x7f0000000040), 0x8}) 17:49:20 executing program 1: unshare(0x20020000) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2201) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) unshare(0x26000000) 17:49:20 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fallocate(r0, 0x9, 0x6, 0x8001) fchdir(r0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0x0) [ 355.429886] FAULT_INJECTION: forcing a failure. [ 355.429886] name failslab, interval 1, probability 0, space 0, times 0 17:49:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800003f00000000000000ef03000000000000000000"], &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x100000000000, 0x4) timerfd_gettime(r1, &(0x7f00000001c0)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001700)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000100)=0x3, 0xffffffffffffffac) [ 355.501329] CPU: 0 PID: 14404 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 355.509882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.519250] Call Trace: [ 355.521866] dump_stack+0x244/0x39d [ 355.525516] ? dump_stack_print_info.cold.1+0x20/0x20 [ 355.530725] ? is_bpf_text_address+0xd3/0x170 [ 355.535254] should_fail.cold.4+0xa/0x17 [ 355.539333] ? __save_stack_trace+0x8d/0xf0 [ 355.543683] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 355.548828] ? save_stack+0xa9/0xd0 [ 355.552473] ? kasan_kmalloc+0xc7/0xe0 [ 355.556372] ? kmem_cache_alloc_trace+0x152/0x750 [ 355.561231] ? legacy_init_fs_context+0x187/0x230 [ 355.566085] ? vfs_new_fs_context+0x3f4/0x77c [ 355.570681] ? do_mount+0xb70/0x1d90 [ 355.574404] ? ksys_mount+0x12d/0x140 [ 355.578218] ? __x64_sys_mount+0xbe/0x150 [ 355.582386] ? do_syscall_64+0x1b9/0x820 [ 355.586471] ? find_held_lock+0x36/0x1c0 [ 355.590587] ? check_preemption_disabled+0x48/0x280 [ 355.595626] ? perf_trace_sched_process_exec+0x860/0x860 [ 355.601106] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 355.606706] __should_failslab+0x124/0x180 [ 355.610964] should_failslab+0x9/0x14 [ 355.614783] kmem_cache_alloc_trace+0x2d7/0x750 [ 355.619468] ? legacy_init_fs_context+0x187/0x230 [ 355.624336] ? rcu_read_lock_sched_held+0x14f/0x180 [ 355.629374] ? kmem_cache_alloc_trace+0x353/0x750 [ 355.634241] ? rcu_read_lock_sched_held+0x14f/0x180 [ 355.639281] apparmor_fs_context_alloc+0x43/0xa0 [ 355.644069] security_fs_context_alloc+0x54/0xb0 [ 355.648848] vfs_new_fs_context+0x446/0x77c [ 355.653194] do_mount+0xb70/0x1d90 [ 355.656752] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 355.662314] ? copy_mount_string+0x40/0x40 [ 355.666586] ? copy_mount_options+0x5f/0x430 [ 355.671019] ? kmem_cache_alloc_trace+0x353/0x750 [ 355.675883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.681463] ? _copy_from_user+0xdf/0x150 [ 355.685637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.691193] ? copy_mount_options+0x315/0x430 [ 355.695715] ksys_mount+0x12d/0x140 [ 355.699361] __x64_sys_mount+0xbe/0x150 [ 355.703353] do_syscall_64+0x1b9/0x820 [ 355.707252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 355.712636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 355.717598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.722461] ? trace_hardirqs_on_caller+0x310/0x310 [ 355.727496] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 355.732531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.738099] ? prepare_exit_to_usermode+0x291/0x3b0 [ 355.743138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.748008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.753208] RIP: 0033:0x459fda [ 355.756415] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 355.775332] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 355.783063] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 355.790347] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 355.797631] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 355.804912] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 355.812194] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 355.836281] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 355.843441] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 355.848745] Oops: 0000 [#1] PREEMPT SMP KASAN [ 355.853248] CPU: 0 PID: 14404 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 355.861747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.871128] RIP: 0010:do_mount+0xb98/0x1d90 [ 355.875461] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 355.894374] RSP: 0018:ffff8801834c7c28 EFLAGS: 00010246 [ 355.899751] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90005ea2000 [ 355.907031] RDX: 1ffffffffffffffe RSI: ffffffff81df05fc RDI: 0000000000000282 [ 355.914308] RBP: ffff8801834c7db0 R08: ffff8801cd5e44c0 R09: 0000000000000000 [ 355.921601] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d8699c30 [ 355.928878] R13: ffff8801c9f96b00 R14: ffff8801c9f96b00 R15: ffff880183940c40 [ 355.936159] FS: 00007f300fb3a700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 355.944401] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 355.950291] CR2: fffffffffffffff4 CR3: 00000001c24ec000 CR4: 00000000001406f0 [ 355.957584] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 355.964862] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 355.972134] Call Trace: [ 355.974748] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 355.980312] ? copy_mount_string+0x40/0x40 [ 355.984579] ? copy_mount_options+0x5f/0x430 [ 355.989001] ? kmem_cache_alloc_trace+0x353/0x750 [ 355.993857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.999409] ? _copy_from_user+0xdf/0x150 [ 356.003588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 356.009142] ? copy_mount_options+0x315/0x430 [ 356.013649] ksys_mount+0x12d/0x140 [ 356.017286] __x64_sys_mount+0xbe/0x150 [ 356.021275] do_syscall_64+0x1b9/0x820 [ 356.025171] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 356.030552] ? syscall_return_slowpath+0x5e0/0x5e0 [ 356.035508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.040362] ? trace_hardirqs_on_caller+0x310/0x310 [ 356.045392] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 356.050422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 356.055973] ? prepare_exit_to_usermode+0x291/0x3b0 [ 356.061003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.065862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.071054] RIP: 0033:0x459fda [ 356.074256] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 356.093189] RSP: 002b:00007f300fb39a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 356.100907] RAX: ffffffffffffffda RBX: 00007f300fb39b30 RCX: 0000000000459fda [ 356.108180] RDX: 00007f300fb39ad0 RSI: 0000000020000080 RDI: 00007f300fb39af0 [ 356.115456] RBP: 0000000020000080 R08: 00007f300fb39b30 R09: 00007f300fb39ad0 [ 356.122734] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 356.130008] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 356.137287] Modules linked in: [ 356.140485] CR2: fffffffffffffff4 [ 356.143943] ---[ end trace 07efc46d388e9e33 ]--- [ 356.148713] RIP: 0010:do_mount+0xb98/0x1d90 [ 356.153046] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 356.171961] RSP: 0018:ffff8801834c7c28 EFLAGS: 00010246 [ 356.177331] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90005ea2000 [ 356.184610] RDX: 1ffffffffffffffe RSI: ffffffff81df05fc RDI: 0000000000000282 [ 356.191891] RBP: ffff8801834c7db0 R08: ffff8801cd5e44c0 R09: 0000000000000000 [ 356.199169] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d8699c30 [ 356.206449] R13: ffff8801c9f96b00 R14: ffff8801c9f96b00 R15: ffff880183940c40 [ 356.213733] FS: 00007f300fb3a700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 356.221965] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 356.227871] CR2: fffffffffffffff4 CR3: 00000001c24ec000 CR4: 00000000001406f0 [ 356.235158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 356.242441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 356.249718] Kernel panic - not syncing: Fatal exception [ 356.256103] Kernel Offset: disabled [ 356.259728] Rebooting in 86400 seconds..